


default search action
15th SECITC 2022: Virtual Event
- Giampaolo Bella, Mihai Doinea, Helge Janicke:

Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13809, Springer 2023, ISBN 978-3-031-32635-6 - Giampaolo Bella

:
Interactional Freedom and Cybersecurity. 1-16 - Malik Alsahli, Alex Borgognoni, Luan Cardoso dos Santos, Hao Cheng, Christian Franck, Johann Großschädl:

Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things. 17-36 - Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas:

Bridges Connecting Encryption Schemes. 37-64 - Debasmita Chakraborty

, Santu Pal
:
Superpoly Recovery of Grain-128AEAD Using Division Property. 65-80 - Giovanni Di Crescenzo, Matluba Khodjaeva, Ta Chen, Rajesh Krishnan, David Shur, Delaram Kahrobaei

, Vladimir Shpilrain:
On Single-Server Delegation of RSA. 81-101 - Subhranil Dutta

, Ratna Dutta, Sourav Mukhopadhyay:
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy. 102-116 - Amirreza Hamidi, Hossein Ghodosi:

Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. 117-132 - Emanuele Bellini

, Yun Ju Huang
, Mohamed Rachidi:
Statistical Tests for Symmetric Primitives - An Application to NIST Lightweight Finalists. 133-152 - Murat Burhan Ilter

, Ali Aydin Selçuk:
MILP-Aided Cryptanalysis of the FUTURE Block Cipher. 153-167 - Ahmad Khoureich Ka

:
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption. 168-183 - Hiromasa Kitai, Naoto Yanai

, Kazuki Iwahana
, Masataka Tatsumi, Jason Paul Cruz
:
MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input. 184-202 - Yuichi Komano

, Mitsugu Iwamoto
, Kazuo Ohta
, Kazuo Sakiyama
:
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function. 203-221 - Yuichi Komano

, Takaaki Mizuki
:
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting. 222-239 - Lukasz Lapczyk, David B. Skillicorn:

Activity Detection from Encrypted Remote Desktop Protocol Traffic. 240-260 - Jana Medková

, Josef Hynek
:
Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments. 261-274 - Sampath Rajapaksha

, Janaka Senanayake
, Harsha K. Kalutarage
, M. Omar Al-Kadri
:
AI-Powered Vulnerability Detection for Secure Source Code Development. 275-288 - Masahisa Shimano

, Kazuo Sakiyama
, Daiki Miyahara
:
Towards Verifying Physical Assumption in Card-Based Cryptography. 289-305 - George Teseleanu

:
The Security of Quasigroups Based Substitution Permutation Networks. 306-319 - Takuya Ishibashi, Toshihiro Ohigashi, Hikaru Tsuchida

:
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures. 320-339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














