LEADER 04436nam 22006615 450 001 996668465703316 005 20250726130231.0 010 $a9783031877605$b(electronic bk.) 010 $z9783031877599 024 7 $a10.1007/978-3-031-87760-5 035 $a(MiAaPQ)EBC32246268 035 $a(Au-PeEL)EBL32246268 035 $a(CKB)39719112100041 035 $a(DE-He213)978-3-031-87760-5 035 $a(EXLCZ)9939719112100041 100 $a20250726d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Security Solutions for Information Technology and Communications $e17th International Conference, SecITC 2024, Bucharest, Romania, November 21?22, 2024, Revised Selected Papers /$fedited by Luciana Morogan, Peter Roenne, Ion Bica 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (405 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15595 311 08$aPrint version: Morogan, Luciana Innovative Security Solutions for Information Technology and Communications Cham : Springer,c2025 9783031877599 327 $a -- Designing Human-centric security protocols. -- Election Security-by-Design. -- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling. -- Locally Verifiable Signature Schemes: A Study of Aggregate and Multi-Signatures. -- Towards Intelligent User Enumeration Based Profiling. -- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control Flow Paths for Evaluating Static Analysis Tools. -- Cyber Threats to Green Hydrogen Production within a Solar Microgrid. .-Stateful Fuzzing of OPC UA . -- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms. -- Card-based Arithmetic Operations and Application to Statistical Data Aggregation. -- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth. -- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices. -- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow Attacks. -- Parameterizing Time-Memory Trade-off for Flexible Implementation of CRYSTALS-Dilithium. -- QUICPot. A HTTP/3 Protocol Honeypot. -- Another Lattice Attack Against an RSA-like Cryptosystem. -- Hybrid solutions for 2PC: How much do they cost?. -- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC. . 330 $aThis book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15595 606 $aData protection 606 $aInformation technology$xManagement 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aData and Information Security 606 $aComputer Application in Administrative Data Processing 606 $aSecurity Services 606 $aMobile and Network Security 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aInformation technology$xManagement. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer Application in Administrative Data Processing. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aMorogan$b Luciana$01835220 701 $aRoenne$b Peter$01835221 701 $aBica$b Ion$01835222 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996668465703316 996 $aInnovative Security Solutions for Information Technology and Communications$94411447 997 $aUNISA