default search action
13th SECITC 2020: Bucharest, Romania
- Diana Maimut, Andrei-George Oprina, Damien Sauveron:
Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12596, Springer 2021, ISBN 978-3-030-69254-4 - Rémi Géraud-Stewart, David Naccache:
Elementary Attestation of Cryptographically Useful Composite Moduli. 1-12 - Yuanzhen Liu, Gerhard Petrus Hancke, Umair Mujtaba Qureshi:
Off-the-Shelf Security Testing Platform for Contactless Systems. 13-23 - Diana Maimut, George Teseleanu:
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption. 24-40 - Anubhab Baksi:
New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming. 41-54 - Yoshifumi Manabe, Hibiki Ono:
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players. 55-70 - Hiroaki Anada:
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers. 71-90 - Mihai-Zicu Mina, Emil Simion:
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. 91-109 - Tetsuya Nagano, Hiroaki Anada:
Approach to Cryptography from Differential Geometry with Example. 110-129 - Andreea-Elena Panait, Ruxandra F. Olimid:
On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management. 130-145 - David Pecl, Yehor Safonov, Zdenek Martinasek, Matej Kacic, Lubomir Almer, Lukas Malina:
Manager Asks: Which Vulnerability Must be Eliminated First? 146-164 - Tung Chou:
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM. 165-184 - Shurook S. Almohamade, John A. Clark, James Law:
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots. 185-197 - Mihai-Cristian Chindris, Mihai Togan, Stefan-Ciprian Arseni:
Secure Speaker Recognition System Using Homomorphic Encryption. 198-211 - Cristian Hristea:
Reliable RFID Offline Privacy. 212-226 - Ion Bica, Roxana Larisa Unc, Stefan Turcanu:
Virtualization and Automation for Cybersecurity Training and Experimentation. 227-241 - Kashi Neupane:
Long-Term Secure Deniable Group Key Establishment. 242-256 - Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone:
Card-Based Covert Lottery. 257-270 - Lukas Malina, David Smekal, Sara Ricci, Jan Hajny, Peter Cíbik, Jakub Hrabovsky:
Hardware-Accelerated Cryptography for Software-Defined Networks with P4. 271-287 - Nasser Al-Hadhrami, Matthew Collinson, Nir Oren:
Security Analysis Using Subjective Attack Trees. 288-301
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.