LEADER 03834nam 22006615 450 001 996587864103316 005 20240120094015.0 010 $a3-031-52947-2 024 7 $a10.1007/978-3-031-52947-4 035 $a(CKB)30035807700041 035 $a(MiAaPQ)EBC31075978 035 $a(Au-PeEL)EBL31075978 035 $a(DE-He213)978-3-031-52947-4 035 $a(EXLCZ)9930035807700041 100 $a20240120d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Security Solutions for Information Technology and Communications$b[electronic resource] $e16th International Conference, SecITC 2023, Bucharest, Romania, November 23?24, 2023, Revised Selected Papers /$fedited by Mark Manulis, Diana Maimu?, George Te?eleanu 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (228 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14534 311 08$a9783031529467 327 $aBASS: Boolean Automorphisms Signature Scheme -- Shpilrain Using Page Offsets for Detecting Control-Flow Anomalies -- Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes -- SDVS Sender-Privacy in the Multi-Party Setting -- Software Mitigation of RISC-V Spectre Attacks -- A Modern Malware-oriented Dynamic Information Retrieval Tool -- M-Sel: A Message Selection Functional Encryption from Simple Tools -- Deniable Public-Key Authenticated Quantum Key Exchange -- Towards a secure and transparent blockchain-based system for e-commerce deliveries -- Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit -- OpenBSD formal driver verification with SeL4 -- An Efficient Small Modulus Test and Its Applications to Delegated Computation without Preprocessing -- Learning Homomorphisms with Rounding and Pseudorandom Function -- Some Results on Related Key-IV Pairs of Espresso. . 330 $aThis book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14534 606 $aData protection 606 $aInformation technology$xManagement 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aData and Information Security 606 $aComputer Application in Administrative Data Processing 606 $aSecurity Services 606 $aMobile and Network Security 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aInformation technology$xManagement. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer Application in Administrative Data Processing. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aManulis$b Mark$01423747 701 $aMaimu?$b Diana$01588946 701 $aTe?eleanu$b George$01588947 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996587864103316 996 $aInnovative Security Solutions for Information Technology and Communications$93883213 997 $aUNISA