TY - BOOK AU - Farshim,Pooya AU - Simion,Emil ED - SpringerLink (Online service) TI - Innovative Security Solutions for Information Technology and Communications: 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers T2 - Security and Cryptology SN - 9783319692845 AV - QA76.9.A25 U1 - 005.8 23 PY - 2017/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Computer security KW - Data structures (Computer science) KW - Computer communication systems KW - Architecture, Computer KW - Special purpose computers KW - Computer science—Mathematics KW - Systems and Data Security KW - Data Structures and Information Theory KW - Computer Communication Networks KW - Computer System Implementation KW - Special Purpose and Application-Based Systems KW - Mathematics of Computing N1 - Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. ; Available to subscribing member institutions only. Доступно лише організаціям членам підписки N2 - This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms UR - https://doi.org/10.1007/978-3-319-69284-5 ER -