Innovative Security Solutions for Information Technology and Communications
portes grátis
Innovative Security Solutions for Information Technology and Communications
14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers
Ryan, Peter Y.A.; Toma, Cristian
Springer International Publishing AG
10/2022
335
Mole
Inglês
9783031175091
15 a 20 dias
Descrição não disponível.
KRAKEN: A Knowledge-Based Recommender system for Analysts, to Kick Exploration up a Notch.- ADAM: Automatic Detection of Android Malware.- Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem.- Identification of Data Breaches from Public Forums.- A Forensic Framework for Webmail Threat Detection using Log Analysis.- An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations.- Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers.- Limitations of the Use of Neural Networks in Black Box Cryptanalysis.- Improved polynomial multiplication algorithms over characteristic three fields and applications to NTRU Prime.- An optimization of Bleichenbacher s Oracle Padding Attack.- UC Analysis of the Randomized McElieceCryptosystem.- Using Five Cards to Encode Each Integer in Z/6Z.- Conditional Differential Cryptanalysis on Bagua.- Perfect Anonymous Authentication and Secure Communication in Internet-of-Things.- Flexible Group Non-Interactive Key Exchange in the Standard Model.- A Multifunctional Modular Implementation of Grover's Algorithm.- Lightweight Swarm Authentication.- New Configurations of Grain Ciphers: Security Against Slide Attacks.- Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing.- Long-Term Secure Asymmetric Group Key Agreement.- Building deobfuscated applications from polymorphic binaries.- Viruses, Exploits, Malware and Security Issues on IoT Devices.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;authentication;communication;communication systems;computer crime;computer security;cryptography;cryptosystems;data communication systems;data security;distributed computer systems;encryption;mathematics;network protocols;network security;public key cryptography;signal processing;telecommunication networks;telecommunication systems;wireless telecommunication systems
KRAKEN: A Knowledge-Based Recommender system for Analysts, to Kick Exploration up a Notch.- ADAM: Automatic Detection of Android Malware.- Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem.- Identification of Data Breaches from Public Forums.- A Forensic Framework for Webmail Threat Detection using Log Analysis.- An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations.- Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers.- Limitations of the Use of Neural Networks in Black Box Cryptanalysis.- Improved polynomial multiplication algorithms over characteristic three fields and applications to NTRU Prime.- An optimization of Bleichenbacher s Oracle Padding Attack.- UC Analysis of the Randomized McElieceCryptosystem.- Using Five Cards to Encode Each Integer in Z/6Z.- Conditional Differential Cryptanalysis on Bagua.- Perfect Anonymous Authentication and Secure Communication in Internet-of-Things.- Flexible Group Non-Interactive Key Exchange in the Standard Model.- A Multifunctional Modular Implementation of Grover's Algorithm.- Lightweight Swarm Authentication.- New Configurations of Grain Ciphers: Security Against Slide Attacks.- Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing.- Long-Term Secure Asymmetric Group Key Agreement.- Building deobfuscated applications from polymorphic binaries.- Viruses, Exploits, Malware and Security Issues on IoT Devices.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;authentication;communication;communication systems;computer crime;computer security;cryptography;cryptosystems;data communication systems;data security;distributed computer systems;encryption;mathematics;network protocols;network security;public key cryptography;signal processing;telecommunication networks;telecommunication systems;wireless telecommunication systems