Innovative security solutions for information technology and communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised selected papers / Jean-Louis Lanet, Cristian Toma (eds.)
نوع المادة : نصاللغة: الإنجليزية السلاسل:Lecture notes in computer science ; 11359 | LNCS sublibraryالناشر:Cham, Switzerland : Springer, 2019وصف:xiii, 530 pages : illustrations (some color) ; 24 cmنوع المحتوى:- text
- unmediated
- volume
- 9783030129415
- 9783030129422
- 303012942X
- SecITC 2018
- QA76.9.A25 I566 2019
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 I566 2019 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000207054 |
Includes author index
Ultralightweight Cryptography -- Some thoughts on ten years of efforts.- Android Malware Analysis: from technical difficulties to scientific challenges.- Post-Quantum Cryptography and a (Qu)Bit More.- Normalization of Java source codes.- HiddenApp -- Securing Linux applications using ARM TrustZone.- Security Knowledge Management in Open Source Software Communities.- Formal Security Analysis of Cloud-connected Industrial Control Systems.- A Hybrid Searchable Encryption Scheme for Cloud Computing.- Securing Cloud Storage by Transparent Biometric Cryptography.- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks.- An Evaluation of OCR Systems against Adversarial Machine Learning.- Intrusion detection and classification with autoencoded deep neural network.- Detecting Malicious Windows Commands Using Natural Language Processing Techniques.- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks.- Assuring Privacy in Surfing the Internet.- Roaming Interface Signaling Security for LTE Networks.- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile.- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders.- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods.- Trends in design of ransomware viruses.- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers.- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology.- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology.- Development of the unified security requirements of PUFs during the standardization process.- A PUF-based Destructive-private Mutual Authentication RFID Protocol.- Weakened Random Oracle Models with Target Prefix.- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields.- On the security of Jhanwar-Barua Identity-Based Encryption Scheme.- Vulnerabilities of the McEliece variants based on Polar codes.- Binary Data Analysis for Source Code Leakage Assessment.- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks.- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib.- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption.- Implementing Searchable Encryption schemes over Multilinear Maps.- A Unified Security Perspective on Legally Fair Contract Signing Protocols.- Relating different Polynomial-LWE problems.- Monoidal encryption over (F2, ·).- Geometric pairwise key-sharing scheme