


default search action
14th SECITC 2021: Virtual Event
- Peter Y. A. Ryan

, Cristian Toma
:
Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13195, Springer 2022, ISBN 978-3-031-17509-1 - Romain Brisse

, Simon Boche, Frédéric Majorczyk, Jean-François Lalande
:
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch. 1-17 - Somanath Tripathy

, Narendra Singh, Divyanshu N. Singh:
ADAM: Automatic Detection of Android Malware. 18-31 - Xiaona Zhang, Yang Liu, Yu Chen:

Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem. 32-45 - Md. Akhtaruzzaman Adnan

, Atika Younus
, Md. Harun Al Kawser
, Natasha Adhikary
, Ahsan Habib
, Rakib Ul Haque
:
Identification of Data Breaches from Public Forums. 46-56 - Abdul Saboor Malik, Muhammad Khuram Shahzad

, Mehdi Hussain:
A Forensic Framework for Webmail Threat Detection Using Log Analysis. 57-69 - Luan Cardoso dos Santos, Johann Großschädl:

An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations. 70-85 - Christian Franck, Johann Großschädl:

Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers. 86-99 - Emanuele Bellini

, Anna Hambitzer, Matteo Protopapa, Matteo Rossi:
Limitations of the Use of Neural Networks in Black Box Cryptanalysis. 100-124 - Esra Yeniaras

, Murat Cenk
:
Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime. 125-144 - Evgnosia-Alexandra Kelesidis:

An Optimization of Bleichenbacher's Oracle Padding Attack. 145-155 - Dániel Zentai

:
UC Analysis of the Randomized McEliece Cryptosystem. 156-164 - Suthee Ruangwises

:
Using Five Cards to Encode Each Integer in $\mathbb {Z}/6\mathbb {Z}$. 165-177 - Xiaojuan Lu, Bohan Li, Shichang Wang, Dongdai Lin:

Conditional Differential Cryptanalysis on Bagua. 178-189 - Li Duan

, Yong Li, Lijun Liao:
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things. 190-209 - Li Duan

, Yong Li, Lijun Liao:
Flexible Group Non-interactive Key Exchange in the Standard Model. 210-227 - Mihai-Zicu Mina

, Emil Simion
:
A Multifunctional Modular Implementation of Grover's Algorithm. 228-247 - George Teseleanu

:
Lightweight Swarm Authentication. 248-259 - Diana Maimut

, George Teseleanu
:
New Configurations of Grain Ciphers: Security Against Slide Attacks. 260-285 - Marian Gusatu

, Ruxandra F. Olimid
:
Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing. 286-295 - Kashi Neupane:

Long-Term Secure Asymmetric Group Key Agreement. 296-307 - Vlad Constantin Craciun

, Andrei-Catalin Mogage
:
Building Deobfuscated Applications from Polymorphic Binaries. 308-323 - Cristian-Valeriu Toma

, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea:
Viruses, Exploits, Malware and Security Issues on IoT Devices. 324-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














