default search action
Search dblp for Publications
export results for "stream:conf/secitc:"
@proceedings{DBLP:conf/secitc/2023, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-52947-4}, doi = {10.1007/978-3-031-52947-4}, isbn = {978-3-031-52946-7}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BaluceaI23, author = {Ruxandra Balucea and Paul Irofti}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Software Mitigation of {RISC-V} Spectre Attacks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {51--64}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_5}, doi = {10.1007/978-3-031-52947-4\_5}, timestamp = {Wed, 14 Feb 2024 10:11:13 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BaluceaI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CotanT23, author = {Paul Cotan and George Teseleanu}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {26--34}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_3}, doi = {10.1007/978-3-031-52947-4\_3}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/CotanT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GrigorievIOS23, author = {Dima Grigoriev and Ilia Ilmer and Alexey Ovchinnikov and Vladimir Shpilrain}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {{BASS:} Boolean Automorphisms Signature Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {1--12}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_1}, doi = {10.1007/978-3-031-52947-4\_1}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/GrigorievIOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Irofti23, author = {Paul Irofti}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Pinky: {A} Modern Malware-Oriented Dynamic Information Retrieval Tool}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {65--78}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_6}, doi = {10.1007/978-3-031-52947-4\_6}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Irofti23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Ka23, author = {Ahmad Khoureich Ka}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {M-Sel: {A} Message Selection Functional Encryption from Simple Tools}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {79--96}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_7}, doi = {10.1007/978-3-031-52947-4\_7}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Ka23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KhodjaevaC23, author = {Matluba Khodjaeva and Giovanni Di Crescenzo}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {An Efficient Small Modulus Test and Its Applications to Delegated Computation Without Preprocessing}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {157--177}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_12}, doi = {10.1007/978-3-031-52947-4\_12}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/KhodjaevaC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NicolaeIL23, author = {Adriana Nicolae and Paul Irofti and Ioana Leustean}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {OpenBSD Formal Driver Verification with SeL4}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {144--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_11}, doi = {10.1007/978-3-031-52947-4\_11}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/NicolaeIL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NosedaK23, author = {Mario Noseda and Simon K{\"{u}}nzli}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {126--143}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_10}, doi = {10.1007/978-3-031-52947-4\_10}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/NosedaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PandeyN23, author = {Dhiraj K. Pandey and Antonio R. Nicolosi}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Learning Burnside Homomorphisms with Rounding and Pseudorandom Function}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {178--196}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_13}, doi = {10.1007/978-3-031-52947-4\_13}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/PandeyN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Teseleanu23, author = {George Teseleanu}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Some Results on Related Key-IV Pairs of Espresso}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {197--216}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_14}, doi = {10.1007/978-3-031-52947-4\_14}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Teseleanu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TheodouliMKTTIVT23, author = {Anastasia Theodouli and Evdoxia Manganopoulou and Athanasios Kalfoutzos and Athanasios Tzikas and Christos Tsislianis and Dimosthenis Ioannidis and Konstantinos Votis and Dimitrios Tzovaras}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Towards a Secure and Transparent Blockchain-Based System for e-Commerce Deliveries}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {113--125}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_9}, doi = {10.1007/978-3-031-52947-4\_9}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/TheodouliMKTTIVT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/VaranHEUTTCFY23, author = {Engincan Varan and Khadija Hanifi and Aysegul Rana Erdemli and Musa Unal and Yunus Emre Tat and Dilara Tekinoglu and Or{\c{c}}un {\c{C}}etin and Ramin Fuladi and Cemal Yilmaz}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Using Page Offsets for Detecting Control-Flow Anomalies}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {13--25}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_2}, doi = {10.1007/978-3-031-52947-4\_2}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/VaranHEUTTCFY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Wier23, author = {Jeroen van Wier}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {{SDVS} Sender-Privacy in the Multi-party Setting}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {35--50}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_4}, doi = {10.1007/978-3-031-52947-4\_4}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Wier23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/WierAR23, author = {Jeroen van Wier and Arash Atashpendar and Peter B. R{\o}nne}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Deniable Public-Key Authenticated Quantum Key Exchange}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {97--112}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_8}, doi = {10.1007/978-3-031-52947-4\_8}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/WierAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2022, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-32636-3}, doi = {10.1007/978-3-031-32636-3}, isbn = {978-3-031-32635-6}, timestamp = {Sun, 21 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AlsahliBSCFG22, author = {Malik Alsahli and Alex Borgognoni and Luan Cardoso dos Santos and Hao Cheng and Christian Franck and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {17--36}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_2}, doi = {10.1007/978-3-031-32636-3\_2}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AlsahliBSCFG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BarcauLPT22, author = {Mugurel Barcau and Cristian Lupascu and Vicentiu Pasol and George C. Turcas}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Bridges Connecting Encryption Schemes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {37--64}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_3}, doi = {10.1007/978-3-031-32636-3\_3}, timestamp = {Sun, 21 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BarcauLPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Bella22, author = {Giampaolo Bella}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Interactional Freedom and Cybersecurity}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {1--16}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_1}, doi = {10.1007/978-3-031-32636-3\_1}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Bella22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BelliniHR22, author = {Emanuele Bellini and Yun Ju Huang and Mohamed Rachidi}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Statistical Tests for Symmetric Primitives - An Application to {NIST} Lightweight Finalists}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {133--152}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_8}, doi = {10.1007/978-3-031-32636-3\_8}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BelliniHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ChakrabortyP22, author = {Debasmita Chakraborty and Santu Pal}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Superpoly Recovery of Grain-128AEAD Using Division Property}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {65--80}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_4}, doi = {10.1007/978-3-031-32636-3\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/ChakrabortyP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CrescenzoKCKSKS22, author = {Giovanni Di Crescenzo and Matluba Khodjaeva and Ta Chen and Rajesh Krishnan and David Shur and Delaram Kahrobaei and Vladimir Shpilrain}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {On Single-Server Delegation of {RSA}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {81--101}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_5}, doi = {10.1007/978-3-031-32636-3\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/CrescenzoKCKSKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DuttaDM22, author = {Subhranil Dutta and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {102--116}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_6}, doi = {10.1007/978-3-031-32636-3\_6}, timestamp = {Sun, 21 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/DuttaDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/HamidiG22, author = {Amirreza Hamidi and Hossein Ghodosi}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {117--132}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_7}, doi = {10.1007/978-3-031-32636-3\_7}, timestamp = {Sun, 21 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/HamidiG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/IlterS22, author = {Murat Burhan Ilter and Ali Aydin Sel{\c{c}}uk}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {MILP-Aided Cryptanalysis of the {FUTURE} Block Cipher}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {153--167}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_9}, doi = {10.1007/978-3-031-32636-3\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/IlterS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/IshibashiOT22, author = {Takuya Ishibashi and Toshihiro Ohigashi and Hikaru Tsuchida}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {320--339}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_19}, doi = {10.1007/978-3-031-32636-3\_19}, timestamp = {Sun, 21 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/IshibashiOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Ka22, author = {Ahmad Khoureich Ka}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {168--183}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_10}, doi = {10.1007/978-3-031-32636-3\_10}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Ka22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KitaiYITC22, author = {Hiromasa Kitai and Naoto Yanai and Kazuki Iwahana and Masataka Tatsumi and Jason Paul Cruz}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {{MOTUS:} How Quantized Parameters Improve Protection of Model and Its Inference Input}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {184--202}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_11}, doi = {10.1007/978-3-031-32636-3\_11}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/KitaiYITC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KomanoIOS22, author = {Yuichi Komano and Mitsugu Iwamoto and Kazuo Ohta and Kazuo Sakiyama}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {203--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_12}, doi = {10.1007/978-3-031-32636-3\_12}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/KomanoIOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KomanoM22, author = {Yuichi Komano and Takaaki Mizuki}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {222--239}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_13}, doi = {10.1007/978-3-031-32636-3\_13}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/KomanoM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/LapczykS22, author = {Lukasz Lapczyk and David B. Skillicorn}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Activity Detection from Encrypted Remote Desktop Protocol Traffic}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {240--260}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_14}, doi = {10.1007/978-3-031-32636-3\_14}, timestamp = {Sun, 21 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/LapczykS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MedkovaH22, author = {Jana Medkov{\'{a}} and Josef Hynek}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {261--274}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_15}, doi = {10.1007/978-3-031-32636-3\_15}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MedkovaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/RajapakshaSKA22, author = {Sampath Rajapaksha and Janaka Senanayake and Harsha K. Kalutarage and M. Omar Al{-}Kadri}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {AI-Powered Vulnerability Detection for Secure Source Code Development}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {275--288}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_16}, doi = {10.1007/978-3-031-32636-3\_16}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/RajapakshaSKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ShimanoSM22, author = {Masahisa Shimano and Kazuo Sakiyama and Daiki Miyahara}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Towards Verifying Physical Assumption in Card-Based Cryptography}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {289--305}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_17}, doi = {10.1007/978-3-031-32636-3\_17}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/ShimanoSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Teseleanu22, author = {George Teseleanu}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {The Security of Quasigroups Based Substitution Permutation Networks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {306--319}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_18}, doi = {10.1007/978-3-031-32636-3\_18}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Teseleanu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2021, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17510-7}, doi = {10.1007/978-3-031-17510-7}, isbn = {978-3-031-17509-1}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AdnanYKAHH21, author = {Md. Akhtaruzzaman Adnan and Atika Younus and Md. Harun Al Kawser and Natasha Adhikary and Ahsan Habib and Rakib Ul Haque}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Identification of Data Breaches from Public Forums}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {46--56}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_4}, doi = {10.1007/978-3-031-17510-7\_4}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/AdnanYKAHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BelliniHPR21, author = {Emanuele Bellini and Anna Hambitzer and Matteo Protopapa and Matteo Rossi}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Limitations of the Use of Neural Networks in Black Box Cryptanalysis}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {100--124}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_8}, doi = {10.1007/978-3-031-17510-7\_8}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BelliniHPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BrisseBML21, author = {Romain Brisse and Simon Boche and Fr{\'{e}}d{\'{e}}ric Majorczyk and Jean{-}Fran{\c{c}}ois Lalande}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {{KRAKEN:} {A} Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {1--17}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_1}, doi = {10.1007/978-3-031-17510-7\_1}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BrisseBML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CraciunM21, author = {Vlad Constantin Craciun and Andrei{-}Catalin Mogage}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Building Deobfuscated Applications from Polymorphic Binaries}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {308--323}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_21}, doi = {10.1007/978-3-031-17510-7\_21}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/CraciunM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DuanLL21, author = {Li Duan and Yong Li and Lijun Liao}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Perfect Anonymous Authentication and Secure Communication in Internet-of-Things}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {190--209}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_14}, doi = {10.1007/978-3-031-17510-7\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/DuanLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DuanLL21a, author = {Li Duan and Yong Li and Lijun Liao}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Flexible Group Non-interactive Key Exchange in the Standard Model}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {210--227}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_15}, doi = {10.1007/978-3-031-17510-7\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/DuanLL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FranckG21, author = {Christian Franck and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Optimized Implementation of {SHA-512} for 16-Bit {MSP430} Microcontrollers}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {86--99}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_7}, doi = {10.1007/978-3-031-17510-7\_7}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/FranckG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GusatuO21, author = {Marian Gusatu and Ruxandra F. Olimid}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {286--295}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_19}, doi = {10.1007/978-3-031-17510-7\_19}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/GusatuO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Kelesidis21, author = {Evgnosia{-}Alexandra Kelesidis}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {An Optimization of Bleichenbacher's Oracle Padding Attack}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {145--155}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_10}, doi = {10.1007/978-3-031-17510-7\_10}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Kelesidis21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/LuLWL21, author = {Xiaojuan Lu and Bohan Li and Shichang Wang and Dongdai Lin}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Conditional Differential Cryptanalysis on Bagua}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {178--189}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_13}, doi = {10.1007/978-3-031-17510-7\_13}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/LuLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutT21, author = {Diana Maimut and George Teseleanu}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {New Configurations of Grain Ciphers: Security Against Slide Attacks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {260--285}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_18}, doi = {10.1007/978-3-031-17510-7\_18}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MaimutT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MalikSH21, author = {Abdul Saboor Malik and Muhammad Khuram Shahzad and Mehdi Hussain}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {A Forensic Framework for Webmail Threat Detection Using Log Analysis}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {57--69}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_5}, doi = {10.1007/978-3-031-17510-7\_5}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MalikSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MinaS21, author = {Mihai{-}Zicu Mina and Emil Simion}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {A Multifunctional Modular Implementation of Grover's Algorithm}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {228--247}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_16}, doi = {10.1007/978-3-031-17510-7\_16}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MinaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Neupane21, author = {Kashi Neupane}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Long-Term Secure Asymmetric Group Key Agreement}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {296--307}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_20}, doi = {10.1007/978-3-031-17510-7\_20}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Neupane21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Ruangwises21, author = {Suthee Ruangwises}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Using Five Cards to Encode Each Integer in {\textdollar}{\textbackslash}mathbb \{Z\}/6{\textbackslash}mathbb \{Z\}{\textdollar}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {165--177}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_12}, doi = {10.1007/978-3-031-17510-7\_12}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Ruangwises21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/SantosG21, author = {Luan Cardoso dos Santos and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {70--85}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_6}, doi = {10.1007/978-3-031-17510-7\_6}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/SantosG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Teseleanu21, author = {George Teseleanu}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Lightweight Swarm Authentication}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {248--259}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_17}, doi = {10.1007/978-3-031-17510-7\_17}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Teseleanu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TomaBPDC21, author = {Cristian{-}Valeriu Toma and Catalin Boja and Marius Popa and Mihai Doinea and Cristian Ciurea}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Viruses, Exploits, Malware and Security Issues on IoT Devices}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {324--334}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_22}, doi = {10.1007/978-3-031-17510-7\_22}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/TomaBPDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TripathySS21, author = {Somanath Tripathy and Narendra Singh and Divyanshu N. Singh}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {{ADAM:} Automatic Detection of Android Malware}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {18--31}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_2}, doi = {10.1007/978-3-031-17510-7\_2}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/TripathySS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/YeniarasC21, author = {Esra Yeniaras and Murat Cenk}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to {NTRU} Prime}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {125--144}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_9}, doi = {10.1007/978-3-031-17510-7\_9}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/YeniarasC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Zentai21, author = {D{\'{a}}niel Zentai}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {{UC} Analysis of the Randomized McEliece Cryptosystem}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {156--164}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_11}, doi = {10.1007/978-3-031-17510-7\_11}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Zentai21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ZhangLC21, author = {Xiaona Zhang and Yang Liu and Yu Chen}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Attack on the Common Prime Version of Murru and Saettone's {RSA} Cryptosystem}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {32--45}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_3}, doi = {10.1007/978-3-031-17510-7\_3}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/ZhangLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2020, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-69255-1}, doi = {10.1007/978-3-030-69255-1}, isbn = {978-3-030-69254-4}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Al-HadhramiCO20, author = {Nasser Al{-}Hadhrami and Matthew Collinson and Nir Oren}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Security Analysis Using Subjective Attack Trees}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {288--301}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_19}, doi = {10.1007/978-3-030-69255-1\_19}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Al-HadhramiCO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AlmohamadeCL20, author = {Shurook S. Almohamade and John A. Clark and James Law}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {185--197}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_12}, doi = {10.1007/978-3-030-69255-1\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AlmohamadeCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Anada20, author = {Hiroaki Anada}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {71--90}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_6}, doi = {10.1007/978-3-030-69255-1\_6}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Anada20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Baksi20, author = {Anubhab Baksi}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {41--54}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_4}, doi = {10.1007/978-3-030-69255-1\_4}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Baksi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BicaUT20, author = {Ion Bica and Roxana Larisa Unc and Stefan Turcanu}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Virtualization and Automation for Cybersecurity Training and Experimentation}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {227--241}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_15}, doi = {10.1007/978-3-030-69255-1\_15}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BicaUT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ChindrisTA20, author = {Mihai{-}Cristian Chindris and Mihai Togan and Stefan{-}Ciprian Arseni}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Secure Speaker Recognition System Using Homomorphic Encryption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {198--211}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_13}, doi = {10.1007/978-3-030-69255-1\_13}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/ChindrisTA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Chou20, author = {Tung Chou}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {An {IND-CCA2} Attack Against the 1st- and 2nd-Round Versions of {NTS-KEM}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {165--184}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_11}, doi = {10.1007/978-3-030-69255-1\_11}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Chou20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Geraud-StewartN20, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Elementary Attestation of Cryptographically Useful Composite Moduli}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {1--12}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_1}, doi = {10.1007/978-3-030-69255-1\_1}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Geraud-StewartN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Hristea20, author = {Cristian Hristea}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Reliable {RFID} Offline Privacy}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {212--226}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_14}, doi = {10.1007/978-3-030-69255-1\_14}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Hristea20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/LiuHQ20, author = {Yuanzhen Liu and Gerhard Petrus Hancke and Umair Mujtaba Qureshi}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Off-the-Shelf Security Testing Platform for Contactless Systems}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {13--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_2}, doi = {10.1007/978-3-030-69255-1\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/LiuHQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutT20, author = {Diana Maimut and George Teseleanu}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2\({}^{\mbox{k}}\)-Residuosity Assumption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {24--40}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_3}, doi = {10.1007/978-3-030-69255-1\_3}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MaimutT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MalinaSRHCH20, author = {Lukas Malina and David Smekal and Sara Ricci and Jan Hajny and Peter C{\'{\i}}bik and Jakub Hrabovsky}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Hardware-Accelerated Cryptography for Software-Defined Networks with {P4}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {271--287}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_18}, doi = {10.1007/978-3-030-69255-1\_18}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MalinaSRHCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ManabeO20, author = {Yoshifumi Manabe and Hibiki Ono}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {55--70}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_5}, doi = {10.1007/978-3-030-69255-1\_5}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/ManabeO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MinaS20, author = {Mihai{-}Zicu Mina and Emil Simion}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {A Scalable Simulation of the {BB84} Protocol Involving Eavesdropping}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {91--109}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_7}, doi = {10.1007/978-3-030-69255-1\_7}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MinaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NaganoA20, author = {Tetsuya Nagano and Hiroaki Anada}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Approach to Cryptography from Differential Geometry with Example}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {110--129}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_8}, doi = {10.1007/978-3-030-69255-1\_8}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/NaganoA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Neupane20, author = {Kashi Neupane}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Long-Term Secure Deniable Group Key Establishment}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {242--256}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_16}, doi = {10.1007/978-3-030-69255-1\_16}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Neupane20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PanaitO20, author = {Andreea{-}Elena Panait and Ruxandra F. Olimid}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {130--145}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_9}, doi = {10.1007/978-3-030-69255-1\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/PanaitO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PeclSMKAM20, author = {David Pecl and Yehor Safonov and Zdenek Martinasek and Matej Kacic and Lubomir Almer and Lukas Malina}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Manager Asks: Which Vulnerability Must be Eliminated First?}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {146--164}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_10}, doi = {10.1007/978-3-030-69255-1\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/PeclSMKAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ShinodaMSMS20, author = {Yuto Shinoda and Daiki Miyahara and Kazumasa Shinagawa and Takaaki Mizuki and Hideaki Sone}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Card-Based Covert Lottery}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {257--270}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_17}, doi = {10.1007/978-3-030-69255-1\_17}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/ShinodaMSMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2019, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-41025-4}, doi = {10.1007/978-3-030-41025-4}, isbn = {978-3-030-41024-7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AciobaniteiUP19, author = {Iulian Aciobanitei and Paul{-}Danut Urian and Mihai{-}Lica Pura}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium {API}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {227--240}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_15}, doi = {10.1007/978-3-030-41025-4\_15}, timestamp = {Fri, 06 Mar 2020 14:27:55 +0100}, biburl = {https://dblp.org/rec/conf/secitc/AciobaniteiUP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AnadaU19, author = {Hiroaki Anada and Yoshifumi Ueshige}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {142--155}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_10}, doi = {10.1007/978-3-030-41025-4\_10}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/AnadaU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BeunardeauOMNRR19, author = {Marc Beunardeau and Fatima{-}Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Authenticated Key Distribution: When the Coupon Collector is Your Enemy}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {1--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_1}, doi = {10.1007/978-3-030-41025-4\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BeunardeauOMNRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BicaCAM19, author = {Ion Bica and Bogdan{-}Cosmin Chifor and Stefan{-}Ciprian Arseni and Ioana Matei}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Reputation-Based Security Framework for Internet of Things}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {213--226}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_14}, doi = {10.1007/978-3-030-41025-4\_14}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BicaCAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BischofOG19, author = {Mario Bischof and Tobias Oder and Tim G{\"{u}}neysu}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Efficient Microcontroller Implementation of {BIKE}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {34--49}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_3}, doi = {10.1007/978-3-030-41025-4\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BischofOG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CostiucMT19, author = {Mariana Costiuc and Diana Maimut and George Teseleanu}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Physical Cryptography}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {156--171}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_11}, doi = {10.1007/978-3-030-41025-4\_11}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/CostiucMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CrescenzoCK19, author = {Giovanni Di Crescenzo and Brian A. Coan and Jonathan Kirsch}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {50--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_4}, doi = {10.1007/978-3-030-41025-4\_4}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/CrescenzoCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CrescenzoSSY19, author = {Giovanni Di Crescenzo and Abhrajit Sengupta and Ozgur Sinanoglu and Muhammad Yasin}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {172--192}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_12}, doi = {10.1007/978-3-030-41025-4\_12}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/CrescenzoSSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/JichiciGM19, author = {Camil Jichici and Bogdan Groza and Pal{-}Stefan Murvay}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {241--256}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_16}, doi = {10.1007/978-3-030-41025-4\_16}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/JichiciGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KanekoYSTKO19, author = {Satomi Kaneko and Akira Yamada and Yukiko Sawaya and Tran Phuong Thao and Ayumu Kubota and Kazumasa Omote}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Detecting Malicious Websites by Query Templates}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {65--77}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_5}, doi = {10.1007/978-3-030-41025-4\_5}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/KanekoYSTKO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Laniado19, author = {Natacha Sylvie Laniado}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {The Ups and Downs of Technology in Society}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {21--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_2}, doi = {10.1007/978-3-030-41025-4\_2}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Laniado19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutM19, author = {Diana Maimut and Alexandru Stefan Mega}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Speeding up {OMD} Instantiations in Hardware}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {193--212}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_13}, doi = {10.1007/978-3-030-41025-4\_13}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MaimutM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MalinaRDSHG19, author = {Lukas Malina and Sara Ricci and Petr Dzurenda and David Smekal and Jan Hajny and Tomas Gerlich}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {109--124}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_8}, doi = {10.1007/978-3-030-41025-4\_8}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MalinaRDSHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Rasoamiaramanana19, author = {Sandra Rasoamiaramanana and Gilles Macario{-}Rat and Marine Minier}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {White-Box Traitor-Tracing from Tardos Probabilistic Codes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {125--141}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_9}, doi = {10.1007/978-3-030-41025-4\_9}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Rasoamiaramanana19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/YashiroHKS19, author = {Risa Yashiro and Yohei Hori and Toshihiro Katashita and Kazuo Sakiyama}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {78--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_6}, doi = {10.1007/978-3-030-41025-4\_6}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/YashiroHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ZitouniM19, author = {Mohammed Zitouni and Farid Mokrane}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Implementing Cryptography Pairings over Ordinary Pairing-Friendly Curves of Type y\({}^{\mbox{2}}\) = x\({}^{\mbox{5}}\) +a, x}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {95--108}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_7}, doi = {10.1007/978-3-030-41025-4\_7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/ZitouniM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2018, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12942-2}, doi = {10.1007/978-3-030-12942-2}, isbn = {978-3-030-12941-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AbedCGA18, author = {Leith Abed and Nathan L. Clarke and Bogdan V. Ghita and Abdulrahman Alruban}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Securing Cloud Storage by Transparent Biometric Cryptography}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {97--108}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_9}, doi = {10.1007/978-3-030-12942-2\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/AbedCGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AhgueNEFMB18, author = {Augustin Ousmanou Ahgue and Jean De Dieu Nkapkop and Joseph Yves Effa and Samuel Franz and Raul Malutan and Monica Borda}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {443--457}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_33}, doi = {10.1007/978-3-030-12942-2\_33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AhgueNEFMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AlyasiriCK18, author = {Hasanen Alyasiri and John A. Clark and Daniel Kudenko}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {170--184}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_14}, doi = {10.1007/978-3-030-12942-2\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AlyasiriCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BarcauPP18, author = {Mugurel Barcau and Vicentiu Pasol and Cezar Plesca}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Monoidal Encryption over ({\textbackslash}mathbb F{\_}2, {\textbackslash}cdot {)} {(} {F} 2 , {\(\cdot\)} {)}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {504--517}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_37}, doi = {10.1007/978-3-030-12942-2\_37}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BarcauPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BodoarcaP18, author = {Stefan Bodoarca and Mihai{-}Lica Pura}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Assuring Privacy in Surfing the Internet}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {185--203}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_15}, doi = {10.1007/978-3-030-12942-2\_15}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BodoarcaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Bolboceanu18, author = {Madalina Bolboceanu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Relating Different Polynomial-LWE Problems}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {492--503}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_36}, doi = {10.1007/978-3-030-12942-2\_36}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Bolboceanu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BruneauDFGHHK018, author = {Nicolas Bruneau and Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Soshi Hamaguchi and Yohei Hori and Yousung Kang and Alexander Schaub}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Development of the Unified Security Requirements of PUFs During the Standardization Process}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {314--330}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_24}, doi = {10.1007/978-3-030-12942-2\_24}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BruneauDFGHHK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ChengDG18, author = {Hao Cheng and Daniel Dinu and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Efficient Implementation of the {SHA-512} Hash Function for 8-Bit {AVR} Microcontrollers}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {273--287}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_21}, doi = {10.1007/978-3-030-12942-2\_21}, timestamp = {Tue, 11 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/ChengDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/CraciunMS18, author = {Vlad Constantin Craciun and Andrei Mogage and Emil Simion}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Trends in Design of Ransomware Viruses}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {259--272}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_20}, doi = {10.1007/978-3-030-12942-2\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/CraciunMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DArco18, author = {Paolo D'Arco}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {1--16}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_1}, doi = {10.1007/978-3-030-12942-2\_1}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/DArco18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DragoiBB18, author = {Vlad Dragoi and Valeriu Beiu and Dominic Bucerzan}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Vulnerabilities of the McEliece Variants Based on Polar Codes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {376--390}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_29}, doi = {10.1007/978-3-030-12942-2\_29}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/DragoiBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FaconGLMP18, author = {Adrien Facon and Sylvain Guilley and Matthieu Lec'Hvien and Damien Marion and Thomas Perianin}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Binary Data Analysis for Source Code Leakage Assessment}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {391--409}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_30}, doi = {10.1007/978-3-030-12942-2\_30}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/FaconGLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FaisalE18, author = {Islam Faisal and Sherif El{-}Kassas}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Limited Proxying for Content Filtering Based on {X.509} Proxy Certificate Profile}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {218--233}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_17}, doi = {10.1007/978-3-030-12942-2\_17}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/FaisalE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/HristeaT18, author = {Cristian Hristea and Ferucio Laurentiu Tiplea}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A PUF-Based Destructive Private Mutual Authentication {RFID} Protocol}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {331--343}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_25}, doi = {10.1007/978-3-030-12942-2\_25}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/HristeaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/JichiciGM18, author = {Camil Jichici and Bogdan Groza and Pal{-}Stefan Murvay}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {109--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_10}, doi = {10.1007/978-3-030-12942-2\_10}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/JichiciGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KakisimNCS18, author = {Arzu Gorgulu Kakisim and Mert Nar and Necmettin Carkaci and Ibrahim Sogukpinar}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {247--258}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_19}, doi = {10.1007/978-3-030-12942-2\_19}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/KakisimNCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KulikTB18, author = {Tomas Kulik and Peter W. V. Tran{-}J{\o}rgensen and Jalil Boudjadar}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Formal Security Analysis of Cloud-Connected Industrial Control Systems}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {71--84}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_7}, doi = {10.1007/978-3-030-12942-2\_7}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/KulikTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Lalande18, author = {Jean{-}Fran{\c{c}}ois Lalande}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Android Malware Analysis: From Technical Difficulties to Scientific Challenges}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {17--21}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_2}, doi = {10.1007/978-3-030-12942-2\_2}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Lalande18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutS18, author = {Diana Maimut and Emil Simion}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Post-quantum Cryptography and a (Qu)Bit More}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {22--28}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_3}, doi = {10.1007/978-3-030-12942-2\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MaimutS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutT18, author = {Diana Maimut and George Teseleanu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A Unified Security Perspective on Legally Fair Contract Signing Protocols}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {477--491}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_35}, doi = {10.1007/978-3-030-12942-2\_35}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MaimutT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MangirCM18, author = {Ceyda Mangir and Murat Cenk and Murat Manguoglu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {358--367}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_27}, doi = {10.1007/978-3-030-12942-2\_27}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MangirCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MelchorKLR18, author = {Carlos Aguilar Melchor and Marc{-}Olivier Killijian and C{\'{e}}dric Lefebvre and Thomas Ricosset}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A Comparison of the Homomorphic Encryption Libraries HElib, {SEAL} and FV-NFLlib}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {425--442}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_32}, doi = {10.1007/978-3-030-12942-2\_32}, timestamp = {Fri, 08 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/MelchorKLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NishigamiI18, author = {Koki Nishigami and Keiichi Iwamura}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Geometric Pairwise Key-Sharing Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {518--528}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_38}, doi = {10.1007/978-3-030-12942-2\_38}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/NishigamiI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NitaM18, author = {Stefania Loredana Nita and Marius Iulian Mihailescu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {A Hybrid Searchable Encryption Scheme for Cloud Computing}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {85--96}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_8}, doi = {10.1007/978-3-030-12942-2\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/NitaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/OuairyBL18, author = {L{\'{e}}opold Ouairy and H{\'{e}}l{\`{e}}ne Le Bouder and Jean{-}Louis Lanet}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Normalization of Java Source Codes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {29--40}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_4}, doi = {10.1007/978-3-030-12942-2\_4}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/OuairyBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PuuskaKAH18, author = {Samir Puuska and Tero Kokkonen and Janne Alatalo and Eppu Heilimo}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {234--246}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_18}, doi = {10.1007/978-3-030-12942-2\_18}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/PuuskaKAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/RantosDDIPK18, author = {Konstantinos Rantos and George Drosatos and Konstantinos Demertzis and Christos Ilioudis and Alexandros Papanikolaou and Antonios Kritsas}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {ADvoCATE: {A} Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {300--313}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_23}, doi = {10.1007/978-3-030-12942-2\_23}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/RantosDDIPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/RezvyPLZ18, author = {Shahadate Rezvy and Miltos Petridis and Aboubaker Lasebae and Tahmina Zebin}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Intrusion Detection and Classification with Autoencoded Deep Neural Network}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {142--156}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_12}, doi = {10.1007/978-3-030-12942-2\_12}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/RezvyPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Schipor18, author = {Adrian G. Schipor}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {On the Security of Jhanwar-Barua Identity-Based Encryption Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {368--375}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_28}, doi = {10.1007/978-3-030-12942-2\_28}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Schipor18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/SinghHK18, author = {Isha Singh and Silke Holtmanns and Raimo Kantola}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Roaming Interface Signaling Security for {LTE} Networks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {204--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_16}, doi = {10.1007/978-3-030-12942-2\_16}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/SinghHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/SporiciCC18, author = {Dan Sporici and Mihai{-}Daniel Chiroiu and Dan Cioc{\^{\i}}rlan}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {An Evaluation of {OCR} Systems Against Adversarial Machine Learning}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {126--141}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_11}, doi = {10.1007/978-3-030-12942-2\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/SporiciCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Talif18, author = {Victor{-}Mihai Talif}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Implementing Searchable Encryption Schemes over Multilinear Maps}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {458--476}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_34}, doi = {10.1007/978-3-030-12942-2\_34}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Talif18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TezukaYT18, author = {Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Weakened Random Oracle Models with Target Prefix}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {344--357}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_26}, doi = {10.1007/978-3-030-12942-2\_26}, timestamp = {Thu, 07 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/TezukaYT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TomaTBPIZ18, author = {Cristian{-}Valeriu Toma and Bogdan Talpiga and Catalin Boja and Marius Popa and Bogdan Iancu and Madalina Zurini}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Secure IoT Supply Chain Management Solution Using Blockchain and Smart Contracts Technology}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {288--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_22}, doi = {10.1007/978-3-030-12942-2\_22}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/TomaTBPIZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/VelciuSC18, author = {Veronica Velciu and Florin{-}Alexandru Stancu and Mihai Chiroiu}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {HiddenApp - Securing Linux Applications Using {ARM} TrustZone}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {41--52}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_5}, doi = {10.1007/978-3-030-12942-2\_5}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/VelciuSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/WangPGJ18, author = {Zihao Wang and ShuangHe Peng and XinYue Guo and Wenbin Jiang}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {410--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_31}, doi = {10.1007/978-3-030-12942-2\_31}, timestamp = {Sat, 13 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/WangPGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/WenKK18, author = {Shao{-}Fang Wen and Mazaher Kianpour and Basel Katt}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Security Knowledge Management in Open Source Software Communities}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {53--70}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_6}, doi = {10.1007/978-3-030-12942-2\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/WenKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/YaminK18, author = {Muhammad Mudassar Yamin and Basel Katt}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Detecting Malicious Windows Commands Using Natural Language Processing Techniques}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {157--169}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_13}, doi = {10.1007/978-3-030-12942-2\_13}, timestamp = {Fri, 08 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/YaminK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BarcauPPT17, author = {Mugurel Barcau and Vicentiu Pasol and Cezar Plesca and Mihai Togan}, editor = {Pooya Farshim and Emil Simion}, title = {On a Key Exchange Protocol}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {187--199}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_13}, doi = {10.1007/978-3-319-69284-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BarcauPPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BrierGN17, author = {{\'{E}}ric Brier and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Pooya Farshim and Emil Simion}, title = {Exploring Naccache-Stern Knapsack Encryption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {67--82}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_6}, doi = {10.1007/978-3-319-69284-5\_6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BrierGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BucerzanDK17, author = {Dominic Bucerzan and Vlad Dragoi and Herv{\'{e}} Tal{\'{e}} Kalachi}, editor = {Pooya Farshim and Emil Simion}, title = {Evolution of the McEliece Public Key Encryption Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {129--149}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_10}, doi = {10.1007/978-3-319-69284-5\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BucerzanDK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FreudenthalW17, author = {Margus Freudenthal and Jan Willemson}, editor = {Pooya Farshim and Emil Simion}, title = {Challenges of Federating National Data Access Infrastructures}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {104--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_8}, doi = {10.1007/978-3-319-69284-5\_8}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/FreudenthalW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GuilleyHTR17, author = {Sylvain Guilley and Annelie Heuser and Ming Tang and Olivier Rioul}, editor = {Pooya Farshim and Emil Simion}, title = {Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {12--27}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_2}, doi = {10.1007/978-3-319-69284-5\_2}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GuilleyHTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GurulianMSFA17, author = {Iakovos Gurulian and Konstantinos Markantonakis and Carlton Shepherd and Eibe Frank and Raja Naeem Akram}, editor = {Pooya Farshim and Emil Simion}, title = {Proximity Assurances Based on Natural and Artificial Ambient Environments}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {83--103}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_7}, doi = {10.1007/978-3-319-69284-5\_7}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/GurulianMSFA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KrzywieckiS17, author = {Lukasz Krzywiecki and Marcin Slowik}, editor = {Pooya Farshim and Emil Simion}, title = {Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {115--128}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_9}, doi = {10.1007/978-3-319-69284-5\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/KrzywieckiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MaimutT17, author = {Diana Maimut and George Teseleanu}, editor = {Pooya Farshim and Emil Simion}, title = {Secretly Embedding Trapdoors into Contract Signing Protocols}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {166--186}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_12}, doi = {10.1007/978-3-319-69284-5\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MaimutT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Orlandi17, author = {Claudio Orlandi}, editor = {Pooya Farshim and Emil Simion}, title = {Faster Zero-Knowledge Protocols and Applications - (Invited Talk Abstract)}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {1--11}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_1}, doi = {10.1007/978-3-319-69284-5\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Orlandi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Ryan17, author = {Peter Y. A. Ryan}, editor = {Pooya Farshim and Emil Simion}, title = {Securing the Foundations of Democracy}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {52--66}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_5}, doi = {10.1007/978-3-319-69284-5\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Ryan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/SasakiT17, author = {Yu Sasaki and Yosuke Todo}, editor = {Pooya Farshim and Emil Simion}, title = {New Algorithm for Modeling S-box in {MILP} Based Differential and Division Trail Search}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {150--165}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_11}, doi = {10.1007/978-3-319-69284-5\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/SasakiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TipleaDN17, author = {Ferucio Laurentiu Tiplea and Constantin Catalin Dragan and Anca{-}Maria Nica}, editor = {Pooya Farshim and Emil Simion}, title = {Key-Policy Attribute-Based Encryption from Bilinear Maps}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {28--42}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_3}, doi = {10.1007/978-3-319-69284-5\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/TipleaDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Vergnaud17, author = {Damien Vergnaud}, editor = {Pooya Farshim and Emil Simion}, title = {Security of Pseudo-Random Number Generators with Input - (Invited Talk)}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {43--51}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_4}, doi = {10.1007/978-3-319-69284-5\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Vergnaud17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2017, editor = {Pooya Farshim and Emil Simion}, title = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5}, doi = {10.1007/978-3-319-69284-5}, isbn = {978-3-319-69283-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BarbulescuSTS16, author = {Mihai Barbulescu and Adrian Stratulat and Vlad Traista{-}Popescu and Emil Simion}, editor = {Ion Bica and Reza Reyhanitabar}, title = {{RSA} Weak Public Keys Available on the Internet}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {92--102}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_6}, doi = {10.1007/978-3-319-47238-6\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BarbulescuSTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BockDL16, author = {Estuardo Alpirez Bock and Zoya Dyka and Peter Langend{\"{o}}rfer}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Increasing the Robustness of the Montgomery kP-Algorithm Against {SCA} by Modifying Its Initialization}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {167--178}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_12}, doi = {10.1007/978-3-319-47238-6\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BockDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DArcoP16, author = {Paolo D'Arco and Roberto De Prisco}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Visual Cryptography - Models, Issues, Applications and New Directions}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {20--39}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_2}, doi = {10.1007/978-3-319-47238-6\_2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/DArcoP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/DurakV16, author = {F. Bet{\"{u}}l Durak and Serge Vaudenay}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Circular Security Reconsidered}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {3--19}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_1}, doi = {10.1007/978-3-319-47238-6\_1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/DurakV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FarhadiL16, author = {Mozhdeh Farhadi and Jean{-}Louis Lanet}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Paper Tigers: An Endless Fight}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {40--62}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_3}, doi = {10.1007/978-3-319-47238-6\_3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/FarhadiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GhimesP16, author = {Ana{-}Maria Ghimes and Victor Valeriu Patriciu}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {274--285}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_20}, doi = {10.1007/978-3-319-47238-6\_20}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GhimesP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Hirose16, author = {Shoichi Hirose}, editor = {Ion Bica and Reza Reyhanitabar}, title = {May-Ozerov Algorithm for Nearest-Neighbor Problem over {\(\mathbb{F}\)}\({}_{\mbox{q}}\) and Its Application to Information Set Decoding}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {115--126}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_8}, doi = {10.1007/978-3-319-47238-6\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Hirose16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/HiroseY16, author = {Shoichi Hirose and Atsushi Yabumoto}, editor = {Ion Bica and Reza Reyhanitabar}, title = {A Tweak for a {PRF} Mode of a Compression Function and Its Applications}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {103--114}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_7}, doi = {10.1007/978-3-319-47238-6\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/HiroseY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/IancuS16, author = {Bogdan Iancu and Cristian Sandu}, editor = {Ion Bica and Reza Reyhanitabar}, title = {A Cryptographic Approach for Implementing Semantic Web's Trust Layer}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {127--136}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_9}, doi = {10.1007/978-3-319-47238-6\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/IancuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Krzywiecki16, author = {Lukasz Krzywiecki}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {137--148}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_10}, doi = {10.1007/978-3-319-47238-6\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Krzywiecki16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/LutasCLL16, author = {Dan Lutas and Adrian Colesa and S{\'{a}}ndor Luk{\'{a}}cs and Andrei Lutas}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {193--208}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_14}, doi = {10.1007/978-3-319-47238-6\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/LutasCLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MarghescuS16, author = {Andrei Marghescu and Paul Svasta}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Pushing the Optimization Limits of Ring Oscillator-Based True Random Number Generators}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {209--224}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_15}, doi = {10.1007/978-3-319-47238-6\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MarghescuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Neupane16, author = {Kashi Neupane}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {81--91}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_5}, doi = {10.1007/978-3-319-47238-6\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Neupane16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PanaitPSVS16, author = {Ioana{-}Cristina Panait and Cristian Pop and Alexandru Sirbu and Adelina Vidovici and Emil Simion}, editor = {Ion Bica and Reza Reyhanitabar}, title = {{TOR} - Didactic Pluggable Transport}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {225--239}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_16}, doi = {10.1007/978-3-319-47238-6\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/PanaitPSVS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PatrascuP16, author = {Alecsandru Patrascu and Stefan Popa}, editor = {Ion Bica and Reza Reyhanitabar}, title = {When Pythons Bite}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {181--192}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_13}, doi = {10.1007/978-3-319-47238-6\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/PatrascuP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PlescaTL16, author = {Cezar Plesca and Mihai Togan and Cristian Lupascu}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Homomorphic Encryption Based on Group Algebras and Goldwasser-Micali Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {149--166}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_11}, doi = {10.1007/978-3-319-47238-6\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/PlescaTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PourghomiSA16, author = {Pardis Pourghomi and Muhammad Qasim Saeed and Pierre E. Abi{-}Char}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Secure Transaction Authentication Protocol}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {261--273}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_19}, doi = {10.1007/978-3-319-47238-6\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/PourghomiSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Radu16, author = {Sabina Georgiana Radu}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Comparative Analysis of Security Operations Centre Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {248--260}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_18}, doi = {10.1007/978-3-319-47238-6\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Radu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TipleaITN16, author = {Ferucio Laurentiu Tiplea and Sorin Iftene and George Teseleanu and Anca{-}Maria Nica}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Security of Identity-Based Encryption Schemes from Quadratic Residues}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {63--77}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_4}, doi = {10.1007/978-3-319-47238-6\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/TipleaITN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/WittkeDSL16, author = {Christian Wittke and Zoya Dyka and Oliver Skibitzki and Peter Langend{\"{o}}rfer}, editor = {Ion Bica and Reza Reyhanitabar}, title = {Preparation of {SCA} Attacks: Successfully Decapsulating {BGA} Packages}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, pages = {240--247}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6\_17}, doi = {10.1007/978-3-319-47238-6\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/WittkeDSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2016, editor = {Ion Bica and Reza Reyhanitabar}, title = {Innovative Security Solutions for Information Technology and Communications - 9th International Conference, {SECITC} 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10006}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47238-6}, doi = {10.1007/978-3-319-47238-6}, isbn = {978-3-319-47237-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/0002K15, author = {Vimal Kumar and Rakesh Kumar}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {171--183}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_12}, doi = {10.1007/978-3-319-27179-8\_12}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/0002K15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Anandakumar15, author = {N. Nalla Anandakumar}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {{SCA} Resistance Analysis on {FPGA} Implementations of Sponge Based {\textbackslash}mathttMAC-{\textbackslash}mathttPHOTON}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {69--86}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_6}, doi = {10.1007/978-3-319-27179-8\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Anandakumar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BalaniciTBM15, author = {Dumitru Balanici and Vlad Tomsa and Monica Borda and Raul Malutan}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Full Duplex {OTP} Cryptosystem Based on {DNA} Key for Text Transmissions}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {39--48}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_3}, doi = {10.1007/978-3-319-27179-8\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BalaniciTBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BarahtianCPLC15, author = {Oana Barahtian and Mihai Cuciuc and Lucian Petcana and Catalin Adrian Leordeanu and Valentin Cristea}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Evaluation of Lightweight Block Ciphers for Embedded Systems}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {49--58}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_4}, doi = {10.1007/978-3-319-27179-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BarahtianCPLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BrierCGMN15, author = {Eric Brier and Jean{-}S{\'{e}}bastien Coron and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {A Number-Theoretic Error-Correcting Code}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {25--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_2}, doi = {10.1007/978-3-319-27179-8\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BrierCGMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BucerzanR15, author = {Dominic Bucerzan and Crina Ratiu}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Contributions to Steganographic Techniques on Mobile Devices}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {242--252}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_17}, doi = {10.1007/978-3-319-27179-8\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BucerzanR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GeraudMNCS15, author = {R{\'{e}}mi G{\'{e}}raud and Diana{-}Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Applying Cryptographic Acceleration Techniques to Error Correction}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {150--168}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_11}, doi = {10.1007/978-3-319-27179-8\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GeraudMNCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GlavanPS15, author = {Ionela Roxana Glavan and Daniel Petcu and Emil Simion}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {{CART} Versus {CHAID} Behavioral Biometric Parameter Segmentation Analysis}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {59--68}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_5}, doi = {10.1007/978-3-319-27179-8\_5}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GlavanPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MarkantonakisAM15, author = {Konstantinos Markantonakis and Raja Naeem Akram and Mehari G. Msgna}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Secure and Trusted Application Execution on Embedded Devices}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {3--24}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_1}, doi = {10.1007/978-3-319-27179-8\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MarkantonakisAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MirskyCS15, author = {Yisroel Mirsky and Noam Cohen and Asaf Shabtai}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Up-High to Down-Low: Applying Machine Learning to an Exploit Database}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {184--200}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_13}, doi = {10.1007/978-3-319-27179-8\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MirskyCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MoradS15, author = {Idan Morad and Asaf Shabtai}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Detecting Computers in Cyber Space Maliciously Exploited as {SSH} Proxies}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {201--211}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_14}, doi = {10.1007/978-3-319-27179-8\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MoradS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NastaseT15, author = {George{-}Daniel Nastase and Ferucio Laurentiu Tiplea}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {On a Lightweight Authentication Protocol for {RFID}}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {212--225}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_15}, doi = {10.1007/978-3-319-27179-8\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/NastaseT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/NkapkopEBT15, author = {Jean De Dieu Nkapkop and Joseph Yves Effa and Monica Borda and Romulus Terebes}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {87--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_7}, doi = {10.1007/978-3-319-27179-8\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/NkapkopEBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/OmerasevicBM15, author = {Damir Omerasevic and Narcis Behlilovic and Sasa Mrdovic}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {A Novel Key Management for Virtually Limitless Key Size}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {102--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_8}, doi = {10.1007/978-3-319-27179-8\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/OmerasevicBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PatrascuBP15, author = {Alecsandru Patrascu and Ion Bica and Victor Valeriu Patriciu}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {226--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_16}, doi = {10.1007/978-3-319-27179-8\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/PatrascuBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/PlescaMT15, author = {Cezar Plesca and Luciana Morogan and Mihai Togan}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Fast Searching in Image Databases Using Multi-index Robust Fingerprinting}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {267--279}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_19}, doi = {10.1007/978-3-319-27179-8\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/PlescaMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/RosiaCT15, author = {Nicolae Rosia and Virgil Cervicescu and Mihai Togan}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Efficient Montgomery Multiplication on GPUs}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {119--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_9}, doi = {10.1007/978-3-319-27179-8\_9}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/RosiaCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ShanmugamA15, author = {Dillibabu Shanmugam and Suganya Annadurai}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Secure Implementation of Stream Cipher: Trivium}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {253--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_18}, doi = {10.1007/978-3-319-27179-8\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/ShanmugamA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Vivek15, author = {S. Sree Vivek}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Stateful Certificateless Public Key Encryption with Application in Public Cloud}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {130--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_10}, doi = {10.1007/978-3-319-27179-8\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Vivek15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2015, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8}, doi = {10.1007/978-3-319-27179-8}, isbn = {978-3-319-27178-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.