Advertisement

Innovative Security Solutions for Information Technology and Communications

9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers

  • Ion Bica
  • Reza Reyhanitabar
Conference proceedings SECITC 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10006)

Also part of the Security and Cryptology book sub series (LNSC, volume 10006)

Table of contents

  1. Front Matter
    Pages I-X
  2. Invited Talks

    1. Front Matter
      Pages 1-1
    2. F. Betül Durak, Serge Vaudenay
      Pages 3-19
    3. Paolo D’Arco, Roberto De Prisco
      Pages 20-39
    4. Mozhdeh Farhadi, Jean-Louis Lanet
      Pages 40-62
    5. Ferucio Laurenţiu Ţiplea, Sorin Iftene, George Teşeleanu, Anca-Maria Nica
      Pages 63-77
  3. Cryptographic Algorithms and Protocols

  4. Security Technologies for ITC

    1. Front Matter
      Pages 179-179
    2. Alecsandru Pătraşcu, Ştefan Popa
      Pages 181-192
    3. Dan Luţaş, Adrian Coleşa, Sándor Lukács, Andrei Luţaş
      Pages 193-208
    4. Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion
      Pages 225-239
    5. Christian Wittke, Zoya Dyka, Oliver Skibitzki, Peter Langendoerfer
      Pages 240-247
    6. Pardis Pourghomi, Muhammad Qasim Saeed, Pierre E. Abi-Char
      Pages 261-273
    7. Ana-Maria Ghimeş, Victor Valeriu Patriciu
      Pages 274-285
  5. Back Matter
    Pages 287-287

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016.

The 16 revised full papers were carefully reviewed and selected from 35 submissions. In addition with 4 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, and Security Technologies for ITC.

Keywords

cryptography embedded systems security network security security in hardware security services access control anonymity and untraceability authentication database and storage security economics of security and privacy elliptic curve cryptography formal methods and theory of security hardware attacks and countermeasures human and societal aspects of security and privacy intrusion/anomaly detection and prevention systems malware and its mitigation operational security privacy-preserving protocols software and application security systems security

Editors and affiliations

  • Ion Bica
    • 1
  • Reza Reyhanitabar
    • 2
  1. 1.Military Technical Academy BucharestRomania
  2. 2.NEC Laboratories Europe HeidelbergGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-47238-6
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-47237-9
  • Online ISBN 978-3-319-47238-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering