


default search action
12th SECITC 2019: Bucharest, Romania
- Emil Simion, Rémi Géraud-Stewart:

Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12001, Springer 2020, ISBN 978-3-030-41024-7 - Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut

, David Naccache, Peter B. Rønne
, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. 1-20 - Natacha Sylvie Laniado:

The Ups and Downs of Technology in Society. 21-33 - Mario Bischof, Tobias Oder, Tim Güneysu

:
Efficient Microcontroller Implementation of BIKE. 34-49 - Giovanni Di Crescenzo, Brian A. Coan, Jonathan Kirsch:

Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols. 50-64 - Satomi Kaneko, Akira Yamada

, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote:
Detecting Malicious Websites by Query Templates. 65-77 - Risa Yashiro, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama:

A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme. 78-94 - Mohammed Zitouni, Farid Mokrane:

Implementing Cryptography Pairings over Ordinary Pairing-Friendly Curves of Type y2 = x5 +a, x. 95-108 - Lukas Malina

, Sara Ricci
, Petr Dzurenda
, David Smekal
, Jan Hajny
, Tomas Gerlich
:
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. 109-124 - Sandra Rasoamiaramanana, Gilles Macario-Rat, Marine Minier:

White-Box Traitor-Tracing from Tardos Probabilistic Codes. 125-141 - Hiroaki Anada, Yoshifumi Ueshige:

Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability. 142-155 - Mariana Costiuc

, Diana Maimut
, George Teseleanu
:
Physical Cryptography. 156-171 - Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu

, Muhammad Yasin
:
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory. 172-192 - Diana Maimut

, Alexandru Stefan Mega
:
Speeding up OMD Instantiations in Hardware. 193-212 - Ion Bica

, Bogdan-Cosmin Chifor
, Stefan-Ciprian Arseni
, Ioana Matei
:
Reputation-Based Security Framework for Internet of Things. 213-226 - Iulian Aciobanitei, Paul-Danut Urian, Mihai-Lica Pura:

Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API. 227-240 - Camil Jichici, Bogdan Groza, Pal-Stefan Murvay

:
Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe. 241-256

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














