LEADER 05449nam 22008535 450 001 996466227703316 005 20200629173841.0 010 $a3-319-27179-2 024 7 $a10.1007/978-3-319-27179-8 035 $a(CKB)4340000000001240 035 $a(SSID)ssj0001616752 035 $a(PQKBManifestationID)16348504 035 $a(PQKBTitleCode)TC0001616752 035 $a(PQKBWorkID)14921331 035 $a(PQKB)10180910 035 $a(DE-He213)978-3-319-27179-8 035 $a(MiAaPQ)EBC6295582 035 $a(MiAaPQ)EBC5587241 035 $a(Au-PeEL)EBL5587241 035 $a(OCoLC)1066185135 035 $a(PPN)191705322 035 $a(EXLCZ)994340000000001240 100 $a20160114d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInnovative Security Solutions for Information Technology and Communications$b[electronic resource] $e8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers /$fedited by Ion Bica, David Naccache, Emil Simion 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XXIV, 281 p. 88 illus.) 225 1 $aSecurity and Cryptology ;$v9522 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-27178-4 320 $aIncludes bibliographical references and index. 327 $aAuthenticated-Encryption: Security Notions, Designs and Applications -- New Results on Identity-based Encryption from Quadratic Residuosity -- Efficient techniques for extracting secrets from electronic devices -- Secure and Trusted Application Execution on Embedded Devices -- A Number-Theoretic Error-Correcting Code -- Full duplex OTP cryptosystem based on DNA key for text transmissions -- Evaluation of Lightweight Block Ciphers for Embedded Systems -- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error Correction -- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs -- Up-high to Down-low: Applying Machine Learning to an Exploit Database -- Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies -- On a Lightweight Authentication Protocol for RFID -- Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure -- Contributions to Steganographic Techniques on Mobile Devices -- Secure implementation of Stream cipher: Trivium -- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics. . 410 0$aSecurity and Cryptology ;$v9522 606 $aComputer security 606 $aInformation storage and retrieval 606 $aApplication software 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aComputer security. 615 0$aInformation storage and retrieval. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 14$aSystems and Data Security. 615 24$aInformation Storage and Retrieval. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aBica$b Ion$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNaccache$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSimion$b Emil$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466227703316 996 $aInnovative Security Solutions for Information Technology and Communications$92046982 997 $aUNISA