


default search action
11th SECITC 2018: Bucharest, Romania
- Jean-Louis Lanet, Cristian Toma: 
 Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11359, Springer 2019, ISBN 978-3-030-12941-5
- Paolo D'Arco: 
 Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts. 1-16
- Jean-François Lalande: 
 Android Malware Analysis: From Technical Difficulties to Scientific Challenges. 17-21
- Diana Maimut  , Emil Simion , Emil Simion : :
 Post-quantum Cryptography and a (Qu)Bit More. 22-28
- Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet: 
 Normalization of Java Source Codes. 29-40
- Veronica Velciu, Florin-Alexandru Stancu, Mihai Chiroiu: 
 HiddenApp - Securing Linux Applications Using ARM TrustZone. 41-52
- Shao-Fang Wen, Mazaher Kianpour  , Basel Katt: , Basel Katt:
 Security Knowledge Management in Open Source Software Communities. 53-70
- Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar: 
 Formal Security Analysis of Cloud-Connected Industrial Control Systems. 71-84
- Stefania Loredana Nita  , Marius Iulian Mihailescu , Marius Iulian Mihailescu : :
 A Hybrid Searchable Encryption Scheme for Cloud Computing. 85-96
- Leith Abed  , Nathan L. Clarke , Nathan L. Clarke , Bogdan V. Ghita , Bogdan V. Ghita , Abdulrahman Alruban: , Abdulrahman Alruban:
 Securing Cloud Storage by Transparent Biometric Cryptography. 97-108
- Camil Jichici, Bogdan Groza, Pal-Stefan Murvay  : :
 Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks. 109-125
- Dan Sporici  , Mihai-Daniel Chiroiu, Dan Ciocîrlan: , Mihai-Daniel Chiroiu, Dan Ciocîrlan:
 An Evaluation of OCR Systems Against Adversarial Machine Learning. 126-141
- Shahadate Rezvy  , Miltos Petridis , Miltos Petridis , Aboubaker Lasebae , Aboubaker Lasebae , Tahmina Zebin , Tahmina Zebin : :
 Intrusion Detection and Classification with Autoencoded Deep Neural Network. 142-156
- Muhammad Mudassar Yamin, Basel Katt: 
 Detecting Malicious Windows Commands Using Natural Language Processing Techniques. 157-169
- Hasanen Alyasiri  , John A. Clark, Daniel Kudenko: , John A. Clark, Daniel Kudenko:
 Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks. 170-184
- Stefan Bodoarca, Mihai-Lica Pura: 
 Assuring Privacy in Surfing the Internet. 185-203
- Isha Singh  , Silke Holtmanns , Silke Holtmanns , Raimo Kantola: , Raimo Kantola:
 Roaming Interface Signaling Security for LTE Networks. 204-217
- Islam Faisal, Sherif El-Kassas: 
 Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile. 218-233
- Samir Puuska, Tero Kokkonen, Janne Alatalo, Eppu Heilimo  : :
 Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders. 234-246
- Arzu Gorgulu Kakisim, Mert Nar, Necmettin Carkaci, Ibrahim Sogukpinar: 
 Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods. 247-258
- Vlad Constantin Craciun  , Andrei Mogage , Andrei Mogage , Emil Simion , Emil Simion : :
 Trends in Design of Ransomware Viruses. 259-272
- Hao Cheng, Daniel Dinu, Johann Großschädl: 
 Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers. 273-287
- Cristian-Valeriu Toma  , Bogdan Talpiga, Catalin Boja , Bogdan Talpiga, Catalin Boja , Marius Popa, Bogdan Iancu , Marius Popa, Bogdan Iancu , Madalina Zurini: , Madalina Zurini:
 Secure IoT Supply Chain Management Solution Using Blockchain and Smart Contracts Technology. 288-299
- Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou, Antonios Kritsas: 
 ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology. 300-313
- Nicolas Bruneau, Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Soshi Hamaguchi, Yohei Hori, Yousung Kang, Alexander Schaub: 
 Development of the Unified Security Requirements of PUFs During the Standardization Process. 314-330
- Cristian Hristea, Ferucio Laurentiu Tiplea: 
 A PUF-Based Destructive Private Mutual Authentication RFID Protocol. 331-343
- Masayuki Tezuka  , Yusuke Yoshida, Keisuke Tanaka: , Yusuke Yoshida, Keisuke Tanaka:
 Weakened Random Oracle Models with Target Prefix. 344-357
- Ceyda Mangir  , Murat Cenk , Murat Cenk , Murat Manguoglu: , Murat Manguoglu:
 An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields. 358-367
- Adrian G. Schipor: 
 On the Security of Jhanwar-Barua Identity-Based Encryption Scheme. 368-375
- Vlad Dragoi  , Valeriu Beiu , Valeriu Beiu , Dominic Bucerzan , Dominic Bucerzan : :
 Vulnerabilities of the McEliece Variants Based on Polar Codes. 376-390
- Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Damien Marion, Thomas Perianin: 
 Binary Data Analysis for Source Code Leakage Assessment. 391-409
- Zihao Wang, ShuangHe Peng, XinYue Guo, Wenbin Jiang  : :
 Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks. 410-424
- Carlos Aguilar Melchor, Marc-Olivier Killijian, Cédric Lefebvre, Thomas Ricosset: 
 A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib. 425-442
- Augustin Ousmanou Ahgue, Jean De Dieu Nkapkop  , Joseph Yves Effa , Joseph Yves Effa , Samuel Franz, Raul Malutan , Samuel Franz, Raul Malutan , Monica Borda: , Monica Borda:
 A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption. 443-457
- Victor-Mihai Talif: 
 Implementing Searchable Encryption Schemes over Multilinear Maps. 458-476
- Diana Maimut  , George Teseleanu , George Teseleanu : :
 A Unified Security Perspective on Legally Fair Contract Signing Protocols. 477-491
- Madalina Bolboceanu: 
 Relating Different Polynomial-LWE Problems. 492-503
- Mugurel Barcau, Vicentiu Pasol  , Cezar Plesca: , Cezar Plesca:
 Monoidal Encryption over (\mathbb F_2, \cdot ) ( F 2 , · ). 504-517
- Koki Nishigami, Keiichi Iwamura: 
 Geometric Pairwise Key-Sharing Scheme. 518-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














