![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
13th SECITC 2020: Bucharest, Romania
- Diana Maimut
, Andrei-George Oprina, Damien Sauveron
:
Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12596, Springer 2021, ISBN 978-3-030-69254-4 - Rémi Géraud-Stewart
, David Naccache:
Elementary Attestation of Cryptographically Useful Composite Moduli. 1-12 - Yuanzhen Liu
, Gerhard Petrus Hancke, Umair Mujtaba Qureshi
:
Off-the-Shelf Security Testing Platform for Contactless Systems. 13-23 - Diana Maimut
, George Teseleanu
:
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption. 24-40 - Anubhab Baksi:
New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming. 41-54 - Yoshifumi Manabe
, Hibiki Ono:
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players. 55-70 - Hiroaki Anada
:
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers. 71-90 - Mihai-Zicu Mina
, Emil Simion
:
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. 91-109 - Tetsuya Nagano, Hiroaki Anada:
Approach to Cryptography from Differential Geometry with Example. 110-129 - Andreea-Elena Panait, Ruxandra F. Olimid
:
On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management. 130-145 - David Pecl, Yehor Safonov
, Zdenek Martinasek
, Matej Kacic, Lubomir Almer, Lukas Malina
:
Manager Asks: Which Vulnerability Must be Eliminated First? 146-164 - Tung Chou:
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM. 165-184 - Shurook S. Almohamade, John A. Clark, James Law
:
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots. 185-197 - Mihai-Cristian Chindris
, Mihai Togan
, Stefan-Ciprian Arseni
:
Secure Speaker Recognition System Using Homomorphic Encryption. 198-211 - Cristian Hristea:
Reliable RFID Offline Privacy. 212-226 - Ion Bica, Roxana Larisa Unc, Stefan Turcanu:
Virtualization and Automation for Cybersecurity Training and Experimentation. 227-241 - Kashi Neupane:
Long-Term Secure Deniable Group Key Establishment. 242-256 - Yuto Shinoda
, Daiki Miyahara
, Kazumasa Shinagawa
, Takaaki Mizuki
, Hideaki Sone
:
Card-Based Covert Lottery. 257-270 - Lukas Malina
, David Smekal
, Sara Ricci
, Jan Hajny
, Peter Cíbik
, Jakub Hrabovsky
:
Hardware-Accelerated Cryptography for Software-Defined Networks with P4. 271-287 - Nasser Al-Hadhrami
, Matthew Collinson
, Nir Oren
:
Security Analysis Using Subjective Attack Trees. 288-301
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.