Innovative Security Solutions for Information Technology and Communications -

Innovative Security Solutions for Information Technology and Communications

14th International Conference, SecITC 2021, Virtual Event, November 25–26, 2021, Revised Selected Papers
Buch | Softcover
X, 335 Seiten
2022 | 1st ed. 2022
Springer International Publishing (Verlag)
978-3-031-17509-1 (ISBN)
53,49 inkl. MwSt
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.
The 22 full papers included in this book were carefully reviewed and selected from 40 submissions. They deal with emergent topics in security and privacy from different communities.  

KRAKEN: A Knowledge-Based Recommender system for Analysts, to Kick Exploration up a Notch.- ADAM: Automatic Detection of Android Malware.- Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem.- Identification of Data Breaches from Public Forums.- A Forensic Framework for Webmail Threat Detection using Log Analysis.- An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations.- Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers.- Limitations of the Use of Neural Networks in Black Box Cryptanalysis.- Improved polynomial multiplication algorithms over characteristic three fields and applications to NTRU Prime.- An optimization of Bleichenbacher s Oracle Padding Attack.- UC Analysis of the Randomized McElieceCryptosystem.- Using Five Cards to Encode Each Integer in Z/6Z.- Conditional Differential Cryptanalysis on Bagua.- Perfect Anonymous Authentication and Secure Communication in Internet-of-Things.- Flexible Group Non-Interactive Key Exchange in the Standard Model.- A Multifunctional Modular Implementation of Grover's Algorithm.- Lightweight Swarm Authentication.- New Configurations of Grain Ciphers: Security Against Slide Attacks.- Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing.- Long-Term Secure Asymmetric Group Key Agreement.- Building deobfuscated applications from polymorphic binaries.- Viruses, Exploits, Malware and Security Issues on IoT Devices.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo X, 335 p. 85 illus., 49 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 534 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Artificial Intelligence • authentication • Communication • Communication Systems • Computer Communication Networks • computer crime • Computer Security • cryptography • Cryptology • Cryptosystems • Data communication systems • Data Security • distributed computer systems • Encryption • Information Systems Applications • Mathematics • Network Protocols • Network Security • Public Key Cryptography • security services • Signal Processing • systems and data security • Telecommunication networks • Telecommunication Systems • wireless telecommunication systems
ISBN-10 3-031-17509-3 / 3031175093
ISBN-13 978-3-031-17509-1 / 9783031175091
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99