default search action
11th SECITC 2018: Bucharest, Romania
- Jean-Louis Lanet, Cristian Toma:
Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11359, Springer 2019, ISBN 978-3-030-12941-5 - Paolo D'Arco:
Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts. 1-16 - Jean-François Lalande:
Android Malware Analysis: From Technical Difficulties to Scientific Challenges. 17-21 - Diana Maimut, Emil Simion:
Post-quantum Cryptography and a (Qu)Bit More. 22-28 - Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:
Normalization of Java Source Codes. 29-40 - Veronica Velciu, Florin-Alexandru Stancu, Mihai Chiroiu:
HiddenApp - Securing Linux Applications Using ARM TrustZone. 41-52 - Shao-Fang Wen, Mazaher Kianpour, Basel Katt:
Security Knowledge Management in Open Source Software Communities. 53-70 - Tomas Kulik, Peter W. V. Tran-Jørgensen, Jalil Boudjadar:
Formal Security Analysis of Cloud-Connected Industrial Control Systems. 71-84 - Stefania Loredana Nita, Marius Iulian Mihailescu:
A Hybrid Searchable Encryption Scheme for Cloud Computing. 85-96 - Leith Abed, Nathan L. Clarke, Bogdan V. Ghita, Abdulrahman Alruban:
Securing Cloud Storage by Transparent Biometric Cryptography. 97-108 - Camil Jichici, Bogdan Groza, Pal-Stefan Murvay:
Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks. 109-125 - Dan Sporici, Mihai-Daniel Chiroiu, Dan Ciocîrlan:
An Evaluation of OCR Systems Against Adversarial Machine Learning. 126-141 - Shahadate Rezvy, Miltos Petridis, Aboubaker Lasebae, Tahmina Zebin:
Intrusion Detection and Classification with Autoencoded Deep Neural Network. 142-156 - Muhammad Mudassar Yamin, Basel Katt:
Detecting Malicious Windows Commands Using Natural Language Processing Techniques. 157-169 - Hasanen Alyasiri, John A. Clark, Daniel Kudenko:
Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks. 170-184 - Stefan Bodoarca, Mihai-Lica Pura:
Assuring Privacy in Surfing the Internet. 185-203 - Isha Singh, Silke Holtmanns, Raimo Kantola:
Roaming Interface Signaling Security for LTE Networks. 204-217 - Islam Faisal, Sherif El-Kassas:
Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile. 218-233 - Samir Puuska, Tero Kokkonen, Janne Alatalo, Eppu Heilimo:
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders. 234-246 - Arzu Gorgulu Kakisim, Mert Nar, Necmettin Carkaci, Ibrahim Sogukpinar:
Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods. 247-258 - Vlad Constantin Craciun, Andrei Mogage, Emil Simion:
Trends in Design of Ransomware Viruses. 259-272 - Hao Cheng, Daniel Dinu, Johann Großschädl:
Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers. 273-287 - Cristian-Valeriu Toma, Bogdan Talpiga, Catalin Boja, Marius Popa, Bogdan Iancu, Madalina Zurini:
Secure IoT Supply Chain Management Solution Using Blockchain and Smart Contracts Technology. 288-299 - Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou, Antonios Kritsas:
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology. 300-313 - Nicolas Bruneau, Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Soshi Hamaguchi, Yohei Hori, Yousung Kang, Alexander Schaub:
Development of the Unified Security Requirements of PUFs During the Standardization Process. 314-330 - Cristian Hristea, Ferucio Laurentiu Tiplea:
A PUF-Based Destructive Private Mutual Authentication RFID Protocol. 331-343 - Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka:
Weakened Random Oracle Models with Target Prefix. 344-357 - Ceyda Mangir, Murat Cenk, Murat Manguoglu:
An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields. 358-367 - Adrian G. Schipor:
On the Security of Jhanwar-Barua Identity-Based Encryption Scheme. 368-375 - Vlad Dragoi, Valeriu Beiu, Dominic Bucerzan:
Vulnerabilities of the McEliece Variants Based on Polar Codes. 376-390 - Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Damien Marion, Thomas Perianin:
Binary Data Analysis for Source Code Leakage Assessment. 391-409 - Zihao Wang, ShuangHe Peng, XinYue Guo, Wenbin Jiang:
Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks. 410-424 - Carlos Aguilar Melchor, Marc-Olivier Killijian, Cédric Lefebvre, Thomas Ricosset:
A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib. 425-442 - Augustin Ousmanou Ahgue, Jean De Dieu Nkapkop, Joseph Yves Effa, Samuel Franz, Raul Malutan, Monica Borda:
A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption. 443-457 - Victor-Mihai Talif:
Implementing Searchable Encryption Schemes over Multilinear Maps. 458-476 - Diana Maimut, George Teseleanu:
A Unified Security Perspective on Legally Fair Contract Signing Protocols. 477-491 - Madalina Bolboceanu:
Relating Different Polynomial-LWE Problems. 492-503 - Mugurel Barcau, Vicentiu Pasol, Cezar Plesca:
Monoidal Encryption over (\mathbb F_2, \cdot ) ( F 2 , · ). 504-517 - Koki Nishigami, Keiichi Iwamura:
Geometric Pairwise Key-Sharing Scheme. 518-528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.