Innovative Security Solutions for Information Technology and Communications 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. [electronic resource] : - 1st ed. 2023. - X, 342 p. 115 illus., 50 illus. in color. online resource. - Lecture Notes in Computer Science, 13809 1611-3349 ; . - Lecture Notes in Computer Science, 13809 .

Interactional Freedom and Cybersecurity -- Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things -- Bridges connecting Encryption Schemes -- Superpoly Recovery of Grain-128AEAD Using Division Property -- On Single-Server Delegation of RSA -- Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy -- Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem -- Statistical tests for symmetric primitives An application to NIST Lightweight finalists -- MILP-aided Cryptanalysis of the FUTURE Block Cipher -- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption -- MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input -- Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function -- Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting -- Activity Detection from Encrypted Remote Desktop Protocol Traffic -- Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments -- AI-Powered Vulnerability Detection for Secure Source Code Development -- Towards Verifying Physical Assumption in Card-Based Cryptography -- The Security of Quasigroups Based Substitution Permutation Networks -- Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures.

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8-9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

9783031326363

10.1007/978-3-031-32636-3 doi


Data protection.
Data and Information Security.

QA76.9.A25

005.8