default search action
SECITC 2015: Bucharest, Romania
- Ion Bica, David Naccache, Emil Simion:
Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9522, Springer 2015, ISBN 978-3-319-27178-1
Invited Talks
- Konstantinos Markantonakis, Raja Naeem Akram, Mehari G. Msgna:
Secure and Trusted Application Execution on Embedded Devices. 3-24 - Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. 25-35
Cryptographic Algorithms and Protocols
- Dumitru Balanici, Vlad Tomsa, Monica Borda, Raul Malutan:
Full Duplex OTP Cryptosystem Based on DNA Key for Text Transmissions. 39-48 - Oana Barahtian, Mihai Cuciuc, Lucian Petcana, Catalin Adrian Leordeanu, Valentin Cristea:
Evaluation of Lightweight Block Ciphers for Embedded Systems. 49-58 - Ionela Roxana Glavan, Daniel Petcu, Emil Simion:
CART Versus CHAID Behavioral Biometric Parameter Segmentation Analysis. 59-68 - N. Nalla Anandakumar:
SCA Resistance Analysis on FPGA Implementations of Sponge Based \mathttMAC-\mathttPHOTON. 69-86 - Jean De Dieu Nkapkop, Joseph Yves Effa, Monica Borda, Romulus Terebes:
A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption. 87-101 - Damir Omerasevic, Narcis Behlilovic, Sasa Mrdovic:
A Novel Key Management for Virtually Limitless Key Size. 102-118 - Nicolae Rosia, Virgil Cervicescu, Mihai Togan:
Efficient Montgomery Multiplication on GPUs. 119-129 - S. Sree Vivek:
Stateful Certificateless Public Key Encryption with Application in Public Cloud. 130-149 - Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion:
Applying Cryptographic Acceleration Techniques to Error Correction. 150-168
Security Technologies for ITC
- Vimal Kumar, Rakesh Kumar:
A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs. 171-183 - Yisroel Mirsky, Noam Cohen, Asaf Shabtai:
Up-High to Down-Low: Applying Machine Learning to an Exploit Database. 184-200 - Idan Morad, Asaf Shabtai:
Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies. 201-211 - George-Daniel Nastase, Ferucio Laurentiu Tiplea:
On a Lightweight Authentication Protocol for RFID. 212-225 - Alecsandru Patrascu, Ion Bica, Victor Valeriu Patriciu:
Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure. 226-241 - Dominic Bucerzan, Crina Ratiu:
Contributions to Steganographic Techniques on Mobile Devices. 242-252 - Dillibabu Shanmugam, Suganya Annadurai:
Secure Implementation of Stream Cipher: Trivium. 253-266 - Cezar Plesca, Luciana Morogan, Mihai Togan:
Fast Searching in Image Databases Using Multi-index Robust Fingerprinting. 267-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.