default search action
15th SECITC 2022: Virtual Event
- Giampaolo Bella, Mihai Doinea, Helge Janicke:
Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13809, Springer 2023, ISBN 978-3-031-32635-6 - Giampaolo Bella:
Interactional Freedom and Cybersecurity. 1-16 - Malik Alsahli, Alex Borgognoni, Luan Cardoso dos Santos, Hao Cheng, Christian Franck, Johann Großschädl:
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things. 17-36 - Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas:
Bridges Connecting Encryption Schemes. 37-64 - Debasmita Chakraborty, Santu Pal:
Superpoly Recovery of Grain-128AEAD Using Division Property. 65-80 - Giovanni Di Crescenzo, Matluba Khodjaeva, Ta Chen, Rajesh Krishnan, David Shur, Delaram Kahrobaei, Vladimir Shpilrain:
On Single-Server Delegation of RSA. 81-101 - Subhranil Dutta, Ratna Dutta, Sourav Mukhopadhyay:
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy. 102-116 - Amirreza Hamidi, Hossein Ghodosi:
Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. 117-132 - Emanuele Bellini, Yun Ju Huang, Mohamed Rachidi:
Statistical Tests for Symmetric Primitives - An Application to NIST Lightweight Finalists. 133-152 - Murat Burhan Ilter, Ali Aydin Selçuk:
MILP-Aided Cryptanalysis of the FUTURE Block Cipher. 153-167 - Ahmad Khoureich Ka:
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption. 168-183 - Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi, Jason Paul Cruz:
MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input. 184-202 - Yuichi Komano, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function. 203-221 - Yuichi Komano, Takaaki Mizuki:
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting. 222-239 - Lukasz Lapczyk, David B. Skillicorn:
Activity Detection from Encrypted Remote Desktop Protocol Traffic. 240-260 - Jana Medková, Josef Hynek:
Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments. 261-274 - Sampath Rajapaksha, Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri:
AI-Powered Vulnerability Detection for Secure Source Code Development. 275-288 - Masahisa Shimano, Kazuo Sakiyama, Daiki Miyahara:
Towards Verifying Physical Assumption in Card-Based Cryptography. 289-305 - George Teseleanu:
The Security of Quasigroups Based Substitution Permutation Networks. 306-319 - Takuya Ishibashi, Toshihiro Ohigashi, Hikaru Tsuchida:
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures. 320-339
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.