000 | 04510nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-17510-7 | ||
003 | DE-He213 | ||
005 | 20240730170146.0 | ||
007 | cr nn 008mamaa | ||
008 | 221012s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031175107 _9978-3-031-17510-7 |
||
024 | 7 |
_a10.1007/978-3-031-17510-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInnovative Security Solutions for Information Technology and Communications _h[electronic resource] : _b14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers / _cedited by Peter Y.A. Ryan, Cristian Toma. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aX, 335 p. 85 illus., 49 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13195 |
|
505 | 0 | _aKRAKEN: A Knowledge-Based Recommender system for Analysts, to Kick Exploration up a Notch -- ADAM: Automatic Detection of Android Malware -- Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem -- Identification of Data Breaches from Public Forums -- A Forensic Framework for Webmail Threat Detection using Log Analysis -- An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations -- Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers -- Limitations of the Use of Neural Networks in Black Box Cryptanalysis -- Improved polynomial multiplication algorithms over characteristic three fields and applications to NTRU Prime -- An optimization of Bleichenbacher s Oracle Padding Attack -- UC Analysis of the Randomized McElieceCryptosystem -- Using Five Cards to Encode Each Integer in Z/6Z -- Conditional Differential Cryptanalysis on Bagua -- Perfect Anonymous Authentication and Secure Communication in Internet-of-Things -- Flexible Group Non-Interactive Key Exchange in the Standard Model -- A Multifunctional Modular Implementation of Grover's Algorithm -- Lightweight Swarm Authentication -- New Configurations of Grain Ciphers: Security Against Slide Attacks -- Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing -- Long-Term Secure Asymmetric Group Key Agreement -- Building deobfuscated applications from polymorphic binaries -- Viruses, Exploits, Malware and Security Issues on IoT Devices. | |
520 | _aThis book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021. The 22 full papers included in this book were carefully reviewed and selected from 40 submissions. They deal with emergent topics in security and privacy from different communities. . | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aApplication software. _992258 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _992259 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer Communication Networks. _992260 |
700 | 1 |
_aRyan, Peter Y.A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992261 |
|
700 | 1 |
_aToma, Cristian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992262 |
|
710 | 2 |
_aSpringerLink (Online service) _992263 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031175091 |
776 | 0 | 8 |
_iPrinted edition: _z9783031175114 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13195 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-17510-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86766 _d86766 |