Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Innovative security solutions for in...
~
International Conference on Security for Information Technology and Communications (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Innovative security solutions for information technology and communications = 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Innovative security solutions for information technology and communications/ edited by Luciana Morogan, Peter Roenne, Ion Bica.
Reminder of title:
17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024 : revised selected papers /
remainder title:
SecITC 2024
other author:
Morogan, Luciana.
corporate name:
International Conference on Security for Information Technology and Communications
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
x, 268 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Designing Human-centric security protocols. -- Election Security-by-Design. -- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling. -- Locally Verifiable Signature Schemes: A Study of Aggregate and Multi-Signatures. -- Towards Intelligent User Enumeration Based Profiling. -- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control Flow Paths for Evaluating Static Analysis Tools. -- Cyber Threats to Green Hydrogen Production within a Solar Microgrid. Stateful Fuzzing of OPC UA. -- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms. -- Card-based Arithmetic Operations and Application to Statistical Data Aggregation. -- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth. -- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices. -- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow Attacks. -- Parameterizing Time-Memory Trade-off for Flexible Implementation of CRYSTALS-Dilithium. -- QUICPot. A HTTP/3 Protocol Honeypot. -- Another Lattice Attack Against an RSA-like Cryptosystem. -- Hybrid solutions for 2PC: How much do they cost?. -- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-87760-5
ISBN:
9783031877605
Innovative security solutions for information technology and communications = 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024 : revised selected papers /
Innovative security solutions for information technology and communications
17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024 : revised selected papers /[electronic resource] :SecITC 2024edited by Luciana Morogan, Peter Roenne, Ion Bica. - Cham :Springer Nature Switzerland :2025. - x, 268 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,155951611-3349 ;. - Lecture notes in computer science ;15595..
Designing Human-centric security protocols. -- Election Security-by-Design. -- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling. -- Locally Verifiable Signature Schemes: A Study of Aggregate and Multi-Signatures. -- Towards Intelligent User Enumeration Based Profiling. -- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control Flow Paths for Evaluating Static Analysis Tools. -- Cyber Threats to Green Hydrogen Production within a Solar Microgrid. Stateful Fuzzing of OPC UA. -- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms. -- Card-based Arithmetic Operations and Application to Statistical Data Aggregation. -- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth. -- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices. -- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow Attacks. -- Parameterizing Time-Memory Trade-off for Flexible Implementation of CRYSTALS-Dilithium. -- QUICPot. A HTTP/3 Protocol Honeypot. -- Another Lattice Attack Against an RSA-like Cryptosystem. -- Hybrid solutions for 2PC: How much do they cost?. -- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security.
ISBN: 9783031877605
Standard No.: 10.1007/978-3-031-87760-5doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Innovative security solutions for information technology and communications = 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024 : revised selected papers /
LDR
:03165nmm a2200373 a 4500
001
2413785
003
DE-He213
005
20250726130231.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031877605
$q
(electronic bk.)
020
$a
9783031877599
$q
(paper)
024
7
$a
10.1007/978-3-031-87760-5
$2
doi
035
$a
978-3-031-87760-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
International Conference on Security for Information Technology and Communications
$n
(17th :
$d
2024 :
$c
Bucharest, Romania)
$3
3790051
245
1 0
$a
Innovative security solutions for information technology and communications
$h
[electronic resource] :
$b
17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024 : revised selected papers /
$c
edited by Luciana Morogan, Peter Roenne, Ion Bica.
246
3
$a
SecITC 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
x, 268 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15595
505
0
$a
Designing Human-centric security protocols. -- Election Security-by-Design. -- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling. -- Locally Verifiable Signature Schemes: A Study of Aggregate and Multi-Signatures. -- Towards Intelligent User Enumeration Based Profiling. -- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control Flow Paths for Evaluating Static Analysis Tools. -- Cyber Threats to Green Hydrogen Production within a Solar Microgrid. Stateful Fuzzing of OPC UA. -- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms. -- Card-based Arithmetic Operations and Application to Statistical Data Aggregation. -- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth. -- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices. -- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow Attacks. -- Parameterizing Time-Memory Trade-off for Flexible Implementation of CRYSTALS-Dilithium. -- QUICPot. A HTTP/3 Protocol Honeypot. -- Another Lattice Attack Against an RSA-like Cryptosystem. -- Hybrid solutions for 2PC: How much do they cost?. -- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC.
520
$a
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Telecommunication systems
$x
Congresses.
$3
649554
650
0
$a
Information technology
$x
Security measures
$v
Congresses.
$3
778799
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Application in Administrative Data Processing.
$3
3594379
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Computer Communication Networks.
$3
775497
700
1
$a
Morogan, Luciana.
$3
3790052
700
1
$a
Roenne, Peter.
$3
3790053
700
1
$a
Bica, Ion.
$3
2165761
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15595.
$3
3790054
856
4 0
$u
https://doi.org/10.1007/978-3-031-87760-5
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9519240
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login