LEADER 03757nam 22005415 450 001 996534465203316 005 20230511150805.0 010 $a3-031-32636-9 024 7 $a10.1007/978-3-031-32636-3 035 $a(CKB)26748409900041 035 $a(MiAaPQ)EBC7248744 035 $a(Au-PeEL)EBL7248744 035 $a(DE-He213)978-3-031-32636-3 035 $a(BIP)090873624 035 $a(PPN)270612211 035 $a(EXLCZ)9926748409900041 100 $a20230511d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Security Solutions for Information Technology and Communications$b[electronic resource] $e15th International Conference, SecITC 2022, Virtual Event, December 8?9, 2022, Revised Selected Papers /$fedited by Giampaolo Bella, Mihai Doinea, Helge Janicke 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (351 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13809 311 $a9783031326356 320 $aIncludes bibliographical references and index. 327 $aInteractional Freedom and Cybersecurity -- Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things -- Bridges connecting Encryption Schemes -- Superpoly Recovery of Grain-128AEAD Using Division Property -- On Single-Server Delegation of RSA -- Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy -- Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem -- Statistical tests for symmetric primitives An application to NIST Lightweight finalists -- MILP-aided Cryptanalysis of the FUTURE Block Cipher -- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption -- MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input -- Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function -- Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting -- Activity Detection from Encrypted Remote Desktop Protocol Traffic -- Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments -- AI-Powered Vulnerability Detection for Secure Source Code Development -- Towards Verifying Physical Assumption in Card-Based Cryptography -- The Security of Quasigroups Based Substitution Permutation Networks -- Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures. 330 $aThis book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8?9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13809 606 $aData protection 606 $aData and Information Security 610 $aMathematics 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aBella$b Giampaolo 702 $aDoinea$b Mihai 702 $aJanicke$b Helge 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996534465203316 996 $aInnovative Security Solutions for Information Technology and Communications$93384102 997 $aUNISA