Advertisement

Innovative Security Solutions for Information Technology and Communications

8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers

  • Ion Bica
  • David Naccache
  • Emil Simion

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9522)

Also part of the Security and Cryptology book sub series (LNSC, volume 9522)

Table of contents

  1. Front Matter
    Pages I-XXIV
  2. Invited Talks

    1. Front Matter
      Pages 1-1
    2. Konstantinos Markantonakis, Raja Naeem Akram, Mehari G. Msgna
      Pages 3-24
    3. Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimuţ, David Naccache
      Pages 25-35
  3. Cryptographic Algorithms and Protocols

    1. Front Matter
      Pages 37-37
    2. Dumitru Balanici, Vlad Tomsa, Monica Borda, Raul Malutan
      Pages 39-48
    3. Oana Barahtian, Mihai Cuciuc, Lucian Petcana, Cătălin Leordeanu, Valentin Cristea
      Pages 49-58
    4. Ionela Roxana Glăvan, Daniel Petcu, Emil Simion
      Pages 59-68
    5. Jean De Dieu Nkapkop, Joseph Yves Effa, Monica Borda, Romulus Terebes
      Pages 87-101
    6. Damir Omerasevic, Narcis Behlilovic, Sasa Mrdovic
      Pages 102-118
    7. Nicolae Roşia, Virgil Cervicescu, Mihai Togan
      Pages 119-129
    8. Rémi Géraud, Diana-Ştefania Maimuţ, David Naccache, Rodrigo Portella do Canto, Emil Simion
      Pages 150-168
  4. Security Technologies for ITC

    1. Front Matter
      Pages 169-169
    2. Yisroel Mirsky, Noam Gross, Asaf Shabtai
      Pages 184-200
    3. George-Daniel Năstase, Ferucio Laurenţiu Ţiplea
      Pages 212-225
    4. Alecsandru Pătraşcu, Ion Bica, Victor Valeriu Patriciu
      Pages 226-241
    5. Dominic Bucerzan, Crina Raţiu
      Pages 242-252
    6. Dillibabu Shanmugam, Suganya Annadurai
      Pages 253-266
    7. Cezar Pleşca, Luciana Morogan, Mihai Togan
      Pages 267-279
  5. Yisroel Mirsky, Noam Gross, Asaf Shabtai
    Pages E1-E1
  6. Back Matter
    Pages 281-281

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015.

The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics.

 

Keywords

cryptographic algorithms embedded systems hardware security mobile ad hoc networks runtime security cloud computing cyberattack data mining decision trees DNA cryptography encrypted traffic lightweight cryptography LSB Steganography machine learning perceptual fingerprinting provable security secure encryption smart cards SSH trusted platform

Editors and affiliations

  • Ion Bica
    • 1
  • David Naccache
    • 2
  • Emil Simion
    • 3
  1. 1.BucharestRomania
  2. 2.Departement d InformatiqueEcole Normale SuperieureParisFrance
  3. 3.Advanced Technologies Institute University Politehnica of BucharestBucharestRomania

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-27179-8
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-27178-1
  • Online ISBN 978-3-319-27179-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site