default search action
Search dblp for Publications
export results for "toc:db/conf/secitc/secitc2018.bht:"
@proceedings{DBLP:conf/secitc/2018, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12942-2}, doi = {10.1007/978-3-030-12942-2}, isbn = {978-3-030-12941-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AbedCGA18, author = {Leith Abed and Nathan L. Clarke and Bogdan V. Ghita and Abdulrahman Alruban}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Securing Cloud Storage by Transparent Biometric Cryptography}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {97--108}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_9}, doi = {10.1007/978-3-030-12942-2\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/AbedCGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AhgueNEFMB18, author = {Augustin Ousmanou Ahgue and Jean De Dieu Nkapkop and Joseph Yves Effa and Samuel Franz and Raul Malutan and Monica Borda}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {443--457}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_33}, doi = {10.1007/978-3-030-12942-2\_33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AhgueNEFMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AlyasiriCK18, author = {Hasanen Alyasiri and John A. Clark and Daniel Kudenko}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {170--184}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_14}, doi = {10.1007/978-3-030-12942-2\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AlyasiriCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BarcauPP18, author = {Mugurel Barcau and Vicentiu Pasol and Cezar Plesca}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Monoidal Encryption over ({\textbackslash}mathbb F{\_}2, {\textbackslash}cdot {)} {(} {F} 2 , {\(\cdot\)} {)}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {504--517}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_37}, doi = {10.1007/978-3-030-12942-2\_37}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BarcauPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BodoarcaP18, author = {Stefan Bodoarca and Mihai{-}Lica Pura}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Assuring Privacy in Surfing the Internet}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {185--203}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_15}, doi = {10.1007/978-3-030-12942-2\_15}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BodoarcaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Bolboceanu18, author = {Madalina Bolboceanu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Relating Different Polynomial-LWE Problems}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {492--503}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_36}, doi = {10.1007/978-3-030-12942-2\_36}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Bolboceanu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BruneauDFGHHK018, author = {Nicolas Bruneau and Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Soshi Hamaguchi and Yohei Hori and Yousung Kang and Alexander Schaub}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Development of the Unified Security Requirements of PUFs During the Standardization Process}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {314--330}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_24}, doi = {10.1007/978-3-030-12942-2\_24}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BruneauDFGHHK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ChengDG18, author = {Hao Cheng and Daniel Dinu and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Efficient Implementation of the {SHA-512} Hash Function for 8-Bit {AVR} Microcontrollers}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {273--287}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_21}, doi = {10.1007/978-3-030-12942-2\_21}, timestamp = {Tue, 11 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/ChengDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CraciunMS18, author = {Vlad Constantin Craciun and Andrei Mogage and Emil Simion}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Trends in Design of Ransomware Viruses}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {259--272}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_20}, doi = {10.1007/978-3-030-12942-2\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/CraciunMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DArco18, author = {Paolo D'Arco}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {1--16}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_1}, doi = {10.1007/978-3-030-12942-2\_1}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/DArco18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DragoiBB18, author = {Vlad Dragoi and Valeriu Beiu and Dominic Bucerzan}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Vulnerabilities of the McEliece Variants Based on Polar Codes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {376--390}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_29}, doi = {10.1007/978-3-030-12942-2\_29}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/DragoiBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FaconGLMP18, author = {Adrien Facon and Sylvain Guilley and Matthieu Lec'Hvien and Damien Marion and Thomas Perianin}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Binary Data Analysis for Source Code Leakage Assessment}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {391--409}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_30}, doi = {10.1007/978-3-030-12942-2\_30}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/FaconGLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FaisalE18, author = {Islam Faisal and Sherif El{-}Kassas}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Limited Proxying for Content Filtering Based on {X.509} Proxy Certificate Profile}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {218--233}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_17}, doi = {10.1007/978-3-030-12942-2\_17}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/FaisalE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/HristeaT18, author = {Cristian Hristea and Ferucio Laurentiu Tiplea}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A PUF-Based Destructive Private Mutual Authentication {RFID} Protocol}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {331--343}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_25}, doi = {10.1007/978-3-030-12942-2\_25}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/HristeaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/JichiciGM18, author = {Camil Jichici and Bogdan Groza and Pal{-}Stefan Murvay}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {109--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_10}, doi = {10.1007/978-3-030-12942-2\_10}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/JichiciGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KakisimNCS18, author = {Arzu Gorgulu Kakisim and Mert Nar and Necmettin Carkaci and Ibrahim Sogukpinar}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {247--258}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_19}, doi = {10.1007/978-3-030-12942-2\_19}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/KakisimNCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KulikTB18, author = {Tomas Kulik and Peter W. V. Tran{-}J{\o}rgensen and Jalil Boudjadar}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Formal Security Analysis of Cloud-Connected Industrial Control Systems}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {71--84}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_7}, doi = {10.1007/978-3-030-12942-2\_7}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/KulikTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Lalande18, author = {Jean{-}Fran{\c{c}}ois Lalande}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Android Malware Analysis: From Technical Difficulties to Scientific Challenges}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {17--21}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_2}, doi = {10.1007/978-3-030-12942-2\_2}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Lalande18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutS18, author = {Diana Maimut and Emil Simion}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Post-quantum Cryptography and a (Qu)Bit More}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {22--28}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_3}, doi = {10.1007/978-3-030-12942-2\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MaimutS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutT18, author = {Diana Maimut and George Teseleanu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A Unified Security Perspective on Legally Fair Contract Signing Protocols}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {477--491}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_35}, doi = {10.1007/978-3-030-12942-2\_35}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MaimutT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MangirCM18, author = {Ceyda Mangir and Murat Cenk and Murat Manguoglu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {358--367}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_27}, doi = {10.1007/978-3-030-12942-2\_27}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MangirCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MelchorKLR18, author = {Carlos Aguilar Melchor and Marc{-}Olivier Killijian and C{\'{e}}dric Lefebvre and Thomas Ricosset}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A Comparison of the Homomorphic Encryption Libraries HElib, {SEAL} and FV-NFLlib}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {425--442}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_32}, doi = {10.1007/978-3-030-12942-2\_32}, timestamp = {Fri, 08 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MelchorKLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NishigamiI18, author = {Koki Nishigami and Keiichi Iwamura}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Geometric Pairwise Key-Sharing Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {518--528}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_38}, doi = {10.1007/978-3-030-12942-2\_38}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/NishigamiI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NitaM18, author = {Stefania Loredana Nita and Marius Iulian Mihailescu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A Hybrid Searchable Encryption Scheme for Cloud Computing}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {85--96}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_8}, doi = {10.1007/978-3-030-12942-2\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/NitaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/OuairyBL18, author = {L{\'{e}}opold Ouairy and H{\'{e}}l{\`{e}}ne Le Bouder and Jean{-}Louis Lanet}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Normalization of Java Source Codes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {29--40}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_4}, doi = {10.1007/978-3-030-12942-2\_4}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/OuairyBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PuuskaKAH18, author = {Samir Puuska and Tero Kokkonen and Janne Alatalo and Eppu Heilimo}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {234--246}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_18}, doi = {10.1007/978-3-030-12942-2\_18}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/PuuskaKAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/RantosDDIPK18, author = {Konstantinos Rantos and George Drosatos and Konstantinos Demertzis and Christos Ilioudis and Alexandros Papanikolaou and Antonios Kritsas}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {ADvoCATE: {A} Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {300--313}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_23}, doi = {10.1007/978-3-030-12942-2\_23}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/RantosDDIPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/RezvyPLZ18, author = {Shahadate Rezvy and Miltos Petridis and Aboubaker Lasebae and Tahmina Zebin}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Intrusion Detection and Classification with Autoencoded Deep Neural Network}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {142--156}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_12}, doi = {10.1007/978-3-030-12942-2\_12}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/RezvyPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Schipor18, author = {Adrian G. Schipor}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {On the Security of Jhanwar-Barua Identity-Based Encryption Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {368--375}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_28}, doi = {10.1007/978-3-030-12942-2\_28}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Schipor18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/SinghHK18, author = {Isha Singh and Silke Holtmanns and Raimo Kantola}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Roaming Interface Signaling Security for {LTE} Networks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {204--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_16}, doi = {10.1007/978-3-030-12942-2\_16}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/SinghHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/SporiciCC18, author = {Dan Sporici and Mihai{-}Daniel Chiroiu and Dan Cioc{\^{\i}}rlan}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {An Evaluation of {OCR} Systems Against Adversarial Machine Learning}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {126--141}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_11}, doi = {10.1007/978-3-030-12942-2\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/SporiciCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Talif18, author = {Victor{-}Mihai Talif}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Implementing Searchable Encryption Schemes over Multilinear Maps}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {458--476}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_34}, doi = {10.1007/978-3-030-12942-2\_34}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Talif18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TezukaYT18, author = {Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Weakened Random Oracle Models with Target Prefix}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {344--357}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_26}, doi = {10.1007/978-3-030-12942-2\_26}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/TezukaYT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TomaTBPIZ18, author = {Cristian{-}Valeriu Toma and Bogdan Talpiga and Catalin Boja and Marius Popa and Bogdan Iancu and Madalina Zurini}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Secure IoT Supply Chain Management Solution Using Blockchain and Smart Contracts Technology}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {288--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_22}, doi = {10.1007/978-3-030-12942-2\_22}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/TomaTBPIZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/VelciuSC18, author = {Veronica Velciu and Florin{-}Alexandru Stancu and Mihai Chiroiu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {HiddenApp - Securing Linux Applications Using {ARM} TrustZone}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {41--52}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_5}, doi = {10.1007/978-3-030-12942-2\_5}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/VelciuSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/WangPGJ18, author = {Zihao Wang and ShuangHe Peng and XinYue Guo and Wenbin Jiang}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {410--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_31}, doi = {10.1007/978-3-030-12942-2\_31}, timestamp = {Sat, 13 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/WangPGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/WenKK18, author = {Shao{-}Fang Wen and Mazaher Kianpour and Basel Katt}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Security Knowledge Management in Open Source Software Communities}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {53--70}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_6}, doi = {10.1007/978-3-030-12942-2\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/WenKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/YaminK18, author = {Muhammad Mudassar Yamin and Basel Katt}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Detecting Malicious Windows Commands Using Natural Language Processing Techniques}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {157--169}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_13}, doi = {10.1007/978-3-030-12942-2\_13}, timestamp = {Fri, 08 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/YaminK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.