


default search action
SECITC 2015: Bucharest, Romania
- Ion Bica, David Naccache, Emil Simion:

Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9522, Springer 2015, ISBN 978-3-319-27178-1
Invited Talks
- Konstantinos Markantonakis

, Raja Naeem Akram
, Mehari G. Msgna:
Secure and Trusted Application Execution on Embedded Devices. 3-24 - Eric Brier, Jean-Sébastien Coron, Rémi Géraud

, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. 25-35
Cryptographic Algorithms and Protocols
- Dumitru Balanici, Vlad Tomsa, Monica Borda, Raul Malutan

:
Full Duplex OTP Cryptosystem Based on DNA Key for Text Transmissions. 39-48 - Oana Barahtian, Mihai Cuciuc, Lucian Petcana, Catalin Adrian Leordeanu

, Valentin Cristea:
Evaluation of Lightweight Block Ciphers for Embedded Systems. 49-58 - Ionela Roxana Glavan

, Daniel Petcu, Emil Simion
:
CART Versus CHAID Behavioral Biometric Parameter Segmentation Analysis. 59-68 - N. Nalla Anandakumar

:
SCA Resistance Analysis on FPGA Implementations of Sponge Based \mathttMAC-\mathttPHOTON. 69-86 - Jean De Dieu Nkapkop

, Joseph Yves Effa
, Monica Borda, Romulus Terebes
:
A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption. 87-101 - Damir Omerasevic, Narcis Behlilovic, Sasa Mrdovic

:
A Novel Key Management for Virtually Limitless Key Size. 102-118 - Nicolae Rosia, Virgil Cervicescu, Mihai Togan:

Efficient Montgomery Multiplication on GPUs. 119-129 - S. Sree Vivek:

Stateful Certificateless Public Key Encryption with Application in Public Cloud. 130-149 - Rémi Géraud

, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion
:
Applying Cryptographic Acceleration Techniques to Error Correction. 150-168
Security Technologies for ITC
- Vimal Kumar

, Rakesh Kumar:
A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs. 171-183 - Yisroel Mirsky, Noam Cohen, Asaf Shabtai:

Up-High to Down-Low: Applying Machine Learning to an Exploit Database. 184-200 - Idan Morad, Asaf Shabtai:

Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies. 201-211 - George-Daniel Nastase, Ferucio Laurentiu Tiplea:

On a Lightweight Authentication Protocol for RFID. 212-225 - Alecsandru Patrascu, Ion Bica

, Victor Valeriu Patriciu:
Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure. 226-241 - Dominic Bucerzan, Crina Ratiu

:
Contributions to Steganographic Techniques on Mobile Devices. 242-252 - Dillibabu Shanmugam, Suganya Annadurai:

Secure Implementation of Stream Cipher: Trivium. 253-266 - Cezar Plesca, Luciana Morogan

, Mihai Togan:
Fast Searching in Image Databases Using Multi-index Robust Fingerprinting. 267-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














