© 2020

Innovative Security Solutions for Information Technology and Communications

12th International Conference, SecITC 2019, Bucharest, Romania, November 14–15, 2019, Revised Selected Papers

  • Emil Simion
  • Rémi Géraud-Stewart
Conference proceedings SecITC 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 12001)

Also part of the Security and Cryptology book sub series (LNSC, volume 12001)

Table of contents

  1. Front Matter
    Pages i-xxii
  2. Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimuţ, David Naccache, Peter B. Rønne, Peter Y. A. Ryan
    Pages 1-20
  3. Natacha Sylvie Laniado
    Pages 21-33
  4. Mario Bischof, Tobias Oder, Tim Güneysu
    Pages 34-49
  5. Giovanni Di Crescenzo, Brian Coan, Jonathan Kirsch
    Pages 50-64
  6. Satomi Kaneko, Akira Yamada, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote
    Pages 65-77
  7. Risa Yashiro, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama
    Pages 78-94
  8. Lukas Malina, Sara Ricci, Petr Dzurenda, David Smekal, Jan Hajny, Tomas Gerlich
    Pages 109-124
  9. Sandra Rasoamiaramanana, Gilles Macario-Rat, Marine Minier
    Pages 125-141
  10. Mariana Costiuc, Diana Maimuţ, George Teşeleanu
    Pages 156-171
  11. Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu, Muhammad Yasin
    Pages 172-192
  12. Diana Maimuţ, Ştefan Alexandru Mega
    Pages 193-212
  13. Ion Bica, Bogdan-Cosmin Chifor, Ștefan-Ciprian Arseni, Ioana Matei
    Pages 213-226
  14. Iulian Aciobanitei, Paul-Danut Urian, Mihai-Lica Pura
    Pages 227-240
  15. Camil Jichici, Bogdan Groza, Pal-Stefan Murvay
    Pages 241-256
  16. Back Matter
    Pages 257-257

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019.

The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security.


cryptography information security key exchange algorithms post-quantum cryptography privacy security IoT architectures elliptic curves mobil critical communications computer networks computer security internet network protocols data security network security authentication public key cryptography engineering computer hardware

Editors and affiliations

  • Emil Simion
    • 1
  • Rémi Géraud-Stewart
    • 2
  1. 1.Polytechnic University of BucharestBucharestRomania
  2. 2.École Normale SupérieureParisFrance

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment