


default search action
13th SECITC 2020: Bucharest, Romania
- Diana Maimut

, Andrei-George Oprina, Damien Sauveron
:
Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12596, Springer 2021, ISBN 978-3-030-69254-4 - Rémi Géraud-Stewart

, David Naccache:
Elementary Attestation of Cryptographically Useful Composite Moduli. 1-12 - Yuanzhen Liu

, Gerhard Petrus Hancke, Umair Mujtaba Qureshi
:
Off-the-Shelf Security Testing Platform for Contactless Systems. 13-23 - Diana Maimut

, George Teseleanu
:
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption. 24-40 - Anubhab Baksi:

New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming. 41-54 - Yoshifumi Manabe

, Hibiki Ono:
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players. 55-70 - Hiroaki Anada

:
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers. 71-90 - Mihai-Zicu Mina

, Emil Simion
:
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. 91-109 - Tetsuya Nagano, Hiroaki Anada:

Approach to Cryptography from Differential Geometry with Example. 110-129 - Andreea-Elena Panait, Ruxandra F. Olimid

:
On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management. 130-145 - David Pecl, Yehor Safonov

, Zdenek Martinasek
, Matej Kacic, Lubomir Almer, Lukas Malina
:
Manager Asks: Which Vulnerability Must be Eliminated First? 146-164 - Tung Chou:

An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM. 165-184 - Shurook S. Almohamade, John A. Clark, James Law

:
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots. 185-197 - Mihai-Cristian Chindris

, Mihai Togan
, Stefan-Ciprian Arseni
:
Secure Speaker Recognition System Using Homomorphic Encryption. 198-211 - Cristian Hristea:

Reliable RFID Offline Privacy. 212-226 - Ion Bica

, Roxana Larisa Unc, Stefan Turcanu:
Virtualization and Automation for Cybersecurity Training and Experimentation. 227-241 - Kashi Neupane:

Long-Term Secure Deniable Group Key Establishment. 242-256 - Yuto Shinoda

, Daiki Miyahara
, Kazumasa Shinagawa
, Takaaki Mizuki
, Hideaki Sone
:
Card-Based Covert Lottery. 257-270 - Lukas Malina

, David Smekal
, Sara Ricci
, Jan Hajny
, Peter Cíbik
, Jakub Hrabovsky
:
Hardware-Accelerated Cryptography for Software-Defined Networks with P4. 271-287 - Nasser Al-Hadhrami

, Matthew Collinson
, Nir Oren
:
Security Analysis Using Subjective Attack Trees. 288-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














