


default search action
17th SECITC 2024: Bucharest, Romania
- Luciana Morogan

, Peter B. Roenne
, Ion Bica
:
Innovative Security Solutions for Information Technology and Communications - 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024, Revised Selected Papers. Lecture Notes in Computer Science 15595, Springer 2025, ISBN 978-3-031-87759-9 - Peter Y. A. Ryan:

Designing Human-centric security protocols. 1-11 - Carsten Schürmann:

Election Security-by-Design. 12-17 - Mehdi Akbari Gurabi

, Muhammad Usman Mansoor, Roman Matzutt
, Avikarsha Mandal
, Stefan Decker
:
A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling. 18-35 - Ahmet Ramazan Agirtas

, Neslihan Yaman Gökce
, Oguz Yayla
:
Locally Verifiable Signature Schemes: A Study of Aggregate and Multi-signatures. 36-56 - Mario Bischof, Edy Portmann:

Towards Intelligent User Enumeration Based Profiling. 57-69 - Razvan-Mihai Bolundut, Adrian-Viorel Colesa

, Radu-Marian Portase
:
CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control Flow Paths for Evaluating Static Analysis Tools. 70-83 - Mehmet Bozdal

, Zoya Pourmirza
:
Cyber Threats to Green Hydrogen Production Within a Solar Microgrid. 84-95 - Cristian Daniele, Mark Fijneman, Erik Poll:

Stateful Fuzzing of OPC UA. 96-107 - Andrei Istrate, Dan Avram, Iulian Aciobanitei

:
Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms. 108-117 - Shun Odaka, Yuichi Komano

:
Card-Based Arithmetic Operations and Application to Statistical Data Aggregation. 118-134 - Mihail-Iulian Plesa

, Ruxandra F. Olimid
:
Privacy-Preserving Multi-party Search via Homomorphic Encryption with Constant Multiplicative Depth. 135-148 - Joshua Renckens, Peter B. Rønne, Johann Großschädl, Peter Y. A. Ryan:

An Evaluation of Post-quantum and Hybrid Noise Protocol Variants on Mobile Devices. 149-169 - Lalit Sharma, Satya Jaswanth Badri, Neeraj Goel:

Strengthening Return Address Stack of Rocket Core Against Buffer Overflow Attacks. 170-188 - Yasushi Takahashi, Naohisa Nishida, Yuji Unagami, Saburo Toyonaga, Naoto Yanai

, Yasuhiko Ikematsu, Koji Nuida
, Masaya Yasuda
:
Parameterizing Time-Memory Trade-Off for Flexible Implementation of CRYSTALS-Dilithium. 189-206 - Maria Teodor, Bogdan-Costel Mocanu, Catalin Negru, Florin Pop:

QUICPot. A HTTP/3 Protocol Honeypot. 207-222 - George Teseleanu

:
Another Lattice Attack Against an RSA-Like Cryptosystem. 223-231 - Antonio Toppi

, Paolo D'Arco:
Hybrid Solutions for 2PC: How Much do they Cost? 232-251 - Oguz Yayla

, Yunus Emre Yilmaz
:
32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC. 252-266

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














