LEADER 04546nam 22007575 450 001 996465338903316 005 20200706045146.0 010 $a3-319-69284-4 024 7 $a10.1007/978-3-319-69284-5 035 $a(CKB)4100000000881980 035 $a(DE-He213)978-3-319-69284-5 035 $a(MiAaPQ)EBC6281605 035 $a(MiAaPQ)EBC5592112 035 $a(Au-PeEL)EBL5592112 035 $a(OCoLC)1009042431 035 $a(PPN)220121559 035 $a(EXLCZ)994100000000881980 100 $a20171028d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Security Solutions for Information Technology and Communications$b[electronic resource] $e10th International Conference, SecITC 2017, Bucharest, Romania, June 8?9, 2017, Revised Selected Papers /$fedited by Pooya Farshim, Emil Simion 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XII, 201 p. 35 illus.) 225 1 $aSecurity and Cryptology ;$v10543 311 $a3-319-69283-6 327 $aFaster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. . 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms. 410 0$aSecurity and Cryptology ;$v10543 606 $aComputer security 606 $aData structures (Computer science) 606 $aComputer communication systems 606 $aArchitecture, Computer 606 $aSpecial purpose computers 606 $aComputer science?Mathematics 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aMathematics of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I17001 615 0$aComputer security. 615 0$aData structures (Computer science). 615 0$aComputer communication systems. 615 0$aArchitecture, Computer. 615 0$aSpecial purpose computers. 615 0$aComputer science?Mathematics. 615 14$aSystems and Data Security. 615 24$aData Structures and Information Theory. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aMathematics of Computing. 676 $a005.8 702 $aFarshim$b Pooya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSimion$b Emil$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465338903316 996 $aInnovative Security Solutions for Information Technology and Communications$92046982 997 $aUNISA