default search action
12th SECITC 2019: Bucharest, Romania
- Emil Simion, Rémi Géraud-Stewart:
Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12001, Springer 2020, ISBN 978-3-030-41024-7 - Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. 1-20 - Natacha Sylvie Laniado:
The Ups and Downs of Technology in Society. 21-33 - Mario Bischof, Tobias Oder, Tim Güneysu:
Efficient Microcontroller Implementation of BIKE. 34-49 - Giovanni Di Crescenzo, Brian A. Coan, Jonathan Kirsch:
Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols. 50-64 - Satomi Kaneko, Akira Yamada, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote:
Detecting Malicious Websites by Query Templates. 65-77 - Risa Yashiro, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama:
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme. 78-94 - Mohammed Zitouni, Farid Mokrane:
Implementing Cryptography Pairings over Ordinary Pairing-Friendly Curves of Type y2 = x5 +a, x. 95-108 - Lukas Malina, Sara Ricci, Petr Dzurenda, David Smekal, Jan Hajny, Tomas Gerlich:
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. 109-124 - Sandra Rasoamiaramanana, Gilles Macario-Rat, Marine Minier:
White-Box Traitor-Tracing from Tardos Probabilistic Codes. 125-141 - Hiroaki Anada, Yoshifumi Ueshige:
Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability. 142-155 - Mariana Costiuc, Diana Maimut, George Teseleanu:
Physical Cryptography. 156-171 - Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu, Muhammad Yasin:
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory. 172-192 - Diana Maimut, Alexandru Stefan Mega:
Speeding up OMD Instantiations in Hardware. 193-212 - Ion Bica, Bogdan-Cosmin Chifor, Stefan-Ciprian Arseni, Ioana Matei:
Reputation-Based Security Framework for Internet of Things. 213-226 - Iulian Aciobanitei, Paul-Danut Urian, Mihai-Lica Pura:
Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API. 227-240 - Camil Jichici, Bogdan Groza, Pal-Stefan Murvay:
Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe. 241-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.