Atjaunināt sīkdatņu piekrišanu

Innovative Security Solutions for Information Technology and Communications: 17th International Conference, SecITC 2024, Bucharest, Romania, November 2122, 2024, Revised Selected Papers [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 280 pages, height x width: 235x155 mm, 69 Illustrations, black and white; X, 280 p. 69 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15595
  • Izdošanas datums: 16-Jul-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031877594
  • ISBN-13: 9783031877599
  • Mīkstie vāki
  • Cena: 109,38 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 128,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 280 pages, height x width: 235x155 mm, 69 Illustrations, black and white; X, 280 p. 69 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15595
  • Izdošanas datums: 16-Jul-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031877594
  • ISBN-13: 9783031877599

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. 

The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security.

 

.- Designing Human-centric security protocols.


.- Election Security-by-Design.


.- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine
Collaboration in Incident Handling.


.- Locally Verifiable Signature Schemes: A Study of Aggregate
and Multi-Signatures.


.- Towards Intelligent User Enumeration Based Profiling.


.- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control
Flow Paths for Evaluating Static Analysis Tools.


.- Cyber Threats to Green Hydrogen Production within a Solar Microgrid.


.-Stateful Fuzzing of OPC UA .


.- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms.


.- Card-based Arithmetic Operations and Application to Statistical
Data Aggregation.


.- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with
Constant Multiplicative Depth.


.- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile
Devices.


.- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow
Attacks.


.- Parameterizing Time-Memory Trade-off for Flexible Implementation
of CRYSTALS-Dilithium.


.- QUICPot. A HTTP/3 Protocol Honeypot.


.- Another Lattice Attack Against an RSA-like Cryptosystem.


.- Hybrid solutions for 2PC: How much do they cost?.


.- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC.