Search dblp for Publications

export results for "stream:streams/conf/secitc:"

 download as .bib file

@proceedings{DBLP:conf/secitc/2023,
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-52947-4},
  doi          = {10.1007/978-3-031-52947-4},
  isbn         = {978-3-031-52946-7},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BaluceaI23,
  author       = {Ruxandra Balucea and
                  Paul Irofti},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Software Mitigation of {RISC-V} Spectre Attacks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_5},
  doi          = {10.1007/978-3-031-52947-4\_5},
  timestamp    = {Wed, 14 Feb 2024 10:11:13 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BaluceaI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/CotanT23,
  author       = {Paul Cotan and
                  George Teseleanu},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Elementary Remarks on Some Quadratic Based Identity Based Encryption
                  Schemes},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {26--34},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_3},
  doi          = {10.1007/978-3-031-52947-4\_3},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/CotanT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GrigorievIOS23,
  author       = {Dima Grigoriev and
                  Ilia Ilmer and
                  Alexey Ovchinnikov and
                  Vladimir Shpilrain},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {{BASS:} Boolean Automorphisms Signature Scheme},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_1},
  doi          = {10.1007/978-3-031-52947-4\_1},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/GrigorievIOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Irofti23,
  author       = {Paul Irofti},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Pinky: {A} Modern Malware-Oriented Dynamic Information Retrieval Tool},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_6},
  doi          = {10.1007/978-3-031-52947-4\_6},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Irofti23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Ka23,
  author       = {Ahmad Khoureich Ka},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {M-Sel: {A} Message Selection Functional Encryption from Simple Tools},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {79--96},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_7},
  doi          = {10.1007/978-3-031-52947-4\_7},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Ka23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KhodjaevaC23,
  author       = {Matluba Khodjaeva and
                  Giovanni Di Crescenzo},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {An Efficient Small Modulus Test and Its Applications to Delegated
                  Computation Without Preprocessing},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {157--177},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_12},
  doi          = {10.1007/978-3-031-52947-4\_12},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/KhodjaevaC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/NicolaeIL23,
  author       = {Adriana Nicolae and
                  Paul Irofti and
                  Ioana Leustean},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {OpenBSD Formal Driver Verification with SeL4},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {144--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_11},
  doi          = {10.1007/978-3-031-52947-4\_11},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/NicolaeIL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/NosedaK23,
  author       = {Mario Noseda and
                  Simon K{\"{u}}nzli},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection
                  Toolkit},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_10},
  doi          = {10.1007/978-3-031-52947-4\_10},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/NosedaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PandeyN23,
  author       = {Dhiraj K. Pandey and
                  Antonio R. Nicolosi},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Learning Burnside Homomorphisms with Rounding and Pseudorandom Function},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {178--196},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_13},
  doi          = {10.1007/978-3-031-52947-4\_13},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/PandeyN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Teseleanu23,
  author       = {George Teseleanu},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Some Results on Related Key-IV Pairs of Espresso},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {197--216},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_14},
  doi          = {10.1007/978-3-031-52947-4\_14},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Teseleanu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TheodouliMKTTIVT23,
  author       = {Anastasia Theodouli and
                  Evdoxia Manganopoulou and
                  Athanasios Kalfoutzos and
                  Athanasios Tzikas and
                  Christos Tsislianis and
                  Dimosthenis Ioannidis and
                  Konstantinos Votis and
                  Dimitrios Tzovaras},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Towards a Secure and Transparent Blockchain-Based System for e-Commerce
                  Deliveries},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {113--125},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_9},
  doi          = {10.1007/978-3-031-52947-4\_9},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/TheodouliMKTTIVT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/VaranHEUTTCFY23,
  author       = {Engincan Varan and
                  Khadija Hanifi and
                  Aysegul Rana Erdemli and
                  Musa Unal and
                  Yunus Emre Tat and
                  Dilara Tekinoglu and
                  Or{\c{c}}un {\c{C}}etin and
                  Ramin Fuladi and
                  Cemal Yilmaz},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Using Page Offsets for Detecting Control-Flow Anomalies},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_2},
  doi          = {10.1007/978-3-031-52947-4\_2},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/VaranHEUTTCFY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Wier23,
  author       = {Jeroen van Wier},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {{SDVS} Sender-Privacy in the Multi-party Setting},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_4},
  doi          = {10.1007/978-3-031-52947-4\_4},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Wier23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/WierAR23,
  author       = {Jeroen van Wier and
                  Arash Atashpendar and
                  Peter B. R{\o}nne},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {Deniable Public-Key Authenticated Quantum Key Exchange},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_8},
  doi          = {10.1007/978-3-031-52947-4\_8},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/WierAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2022,
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-32636-3},
  doi          = {10.1007/978-3-031-32636-3},
  isbn         = {978-3-031-32635-6},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AlsahliBSCFG22,
  author       = {Malik Alsahli and
                  Alex Borgognoni and
                  Luan Cardoso dos Santos and
                  Hao Cheng and
                  Christian Franck and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Lightweight Permutation-Based Cryptography for the Ultra-Low-Power
                  Internet of Things},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {17--36},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_2},
  doi          = {10.1007/978-3-031-32636-3\_2},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/AlsahliBSCFG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BarcauLPT22,
  author       = {Mugurel Barcau and
                  Cristian Lupascu and
                  Vicentiu Pasol and
                  George C. Turcas},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Bridges Connecting Encryption Schemes},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {37--64},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_3},
  doi          = {10.1007/978-3-031-32636-3\_3},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BarcauLPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Bella22,
  author       = {Giampaolo Bella},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Interactional Freedom and Cybersecurity},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_1},
  doi          = {10.1007/978-3-031-32636-3\_1},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Bella22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BelliniHR22,
  author       = {Emanuele Bellini and
                  Yun Ju Huang and
                  Mohamed Rachidi},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Statistical Tests for Symmetric Primitives - An Application to {NIST}
                  Lightweight Finalists},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_8},
  doi          = {10.1007/978-3-031-32636-3\_8},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BelliniHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ChakrabortyP22,
  author       = {Debasmita Chakraborty and
                  Santu Pal},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Superpoly Recovery of Grain-128AEAD Using Division Property},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_4},
  doi          = {10.1007/978-3-031-32636-3\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/ChakrabortyP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/CrescenzoKCKSKS22,
  author       = {Giovanni Di Crescenzo and
                  Matluba Khodjaeva and
                  Ta Chen and
                  Rajesh Krishnan and
                  David Shur and
                  Delaram Kahrobaei and
                  Vladimir Shpilrain},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {On Single-Server Delegation of {RSA}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {81--101},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_5},
  doi          = {10.1007/978-3-031-32636-3\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/CrescenzoKCKSKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/DuttaDM22,
  author       = {Subhranil Dutta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Constructing Pairing Free Unbounded Inner Product Functional Encryption
                  Schemes with Unbounded Inner Product Policy},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {102--116},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_6},
  doi          = {10.1007/978-3-031-32636-3\_6},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/DuttaDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/HamidiG22,
  author       = {Amirreza Hamidi and
                  Hossein Ghodosi},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {117--132},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_7},
  doi          = {10.1007/978-3-031-32636-3\_7},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/HamidiG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/IlterS22,
  author       = {Murat Burhan Ilter and
                  Ali Aydin Sel{\c{c}}uk},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {MILP-Aided Cryptanalysis of the {FUTURE} Block Cipher},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_9},
  doi          = {10.1007/978-3-031-32636-3\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/IlterS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/IshibashiOT22,
  author       = {Takuya Ishibashi and
                  Toshihiro Ohigashi and
                  Hikaru Tsuchida},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Unbounded Revocable Decentralized Multi-Authority Attribute-Based
                  Encryption Supporting Non-monotone Access Structures},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {320--339},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_19},
  doi          = {10.1007/978-3-031-32636-3\_19},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/IshibashiOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Ka22,
  author       = {Ahmad Khoureich Ka},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_10},
  doi          = {10.1007/978-3-031-32636-3\_10},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Ka22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KitaiYITC22,
  author       = {Hiromasa Kitai and
                  Naoto Yanai and
                  Kazuki Iwahana and
                  Masataka Tatsumi and
                  Jason Paul Cruz},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {{MOTUS:} How Quantized Parameters Improve Protection of Model and
                  Its Inference Input},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {184--202},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_11},
  doi          = {10.1007/978-3-031-32636-3\_11},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/KitaiYITC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KomanoIOS22,
  author       = {Yuichi Komano and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Lightweight Authentication Using Noisy Key Derived from Physically
                  Unclonable Function},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_12},
  doi          = {10.1007/978-3-031-32636-3\_12},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/KomanoIOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KomanoM22,
  author       = {Yuichi Komano and
                  Takaaki Mizuki},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {222--239},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_13},
  doi          = {10.1007/978-3-031-32636-3\_13},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/KomanoM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/LapczykS22,
  author       = {Lukasz Lapczyk and
                  David B. Skillicorn},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Activity Detection from Encrypted Remote Desktop Protocol Traffic},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {240--260},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_14},
  doi          = {10.1007/978-3-031-32636-3\_14},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/LapczykS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MedkovaH22,
  author       = {Jana Medkov{\'{a}} and
                  Josef Hynek},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Application-Oriented Anonymization Framework for Social Network Datasets
                  and IoT Environments},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {261--274},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_15},
  doi          = {10.1007/978-3-031-32636-3\_15},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MedkovaH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/RajapakshaSKA22,
  author       = {Sampath Rajapaksha and
                  Janaka Senanayake and
                  Harsha K. Kalutarage and
                  M. Omar Al{-}Kadri},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {AI-Powered Vulnerability Detection for Secure Source Code Development},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {275--288},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_16},
  doi          = {10.1007/978-3-031-32636-3\_16},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/RajapakshaSKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ShimanoSM22,
  author       = {Masahisa Shimano and
                  Kazuo Sakiyama and
                  Daiki Miyahara},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Towards Verifying Physical Assumption in Card-Based Cryptography},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {289--305},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_17},
  doi          = {10.1007/978-3-031-32636-3\_17},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/ShimanoSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Teseleanu22,
  author       = {George Teseleanu},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {The Security of Quasigroups Based Substitution Permutation Networks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {306--319},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_18},
  doi          = {10.1007/978-3-031-32636-3\_18},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Teseleanu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2021,
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17510-7},
  doi          = {10.1007/978-3-031-17510-7},
  isbn         = {978-3-031-17509-1},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AdnanYKAHH21,
  author       = {Md. Akhtaruzzaman Adnan and
                  Atika Younus and
                  Md. Harun Al Kawser and
                  Natasha Adhikary and
                  Ahsan Habib and
                  Rakib Ul Haque},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Identification of Data Breaches from Public Forums},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {46--56},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_4},
  doi          = {10.1007/978-3-031-17510-7\_4},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/AdnanYKAHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BelliniHPR21,
  author       = {Emanuele Bellini and
                  Anna Hambitzer and
                  Matteo Protopapa and
                  Matteo Rossi},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Limitations of the Use of Neural Networks in Black Box Cryptanalysis},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {100--124},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_8},
  doi          = {10.1007/978-3-031-17510-7\_8},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BelliniHPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BrisseBML21,
  author       = {Romain Brisse and
                  Simon Boche and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk and
                  Jean{-}Fran{\c{c}}ois Lalande},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {{KRAKEN:} {A} Knowledge-Based Recommender System for Analysts, to
                  Kick Exploration up a Notch},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_1},
  doi          = {10.1007/978-3-031-17510-7\_1},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BrisseBML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/CraciunM21,
  author       = {Vlad Constantin Craciun and
                  Andrei{-}Catalin Mogage},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Building Deobfuscated Applications from Polymorphic Binaries},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {308--323},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_21},
  doi          = {10.1007/978-3-031-17510-7\_21},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/CraciunM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/DuanLL21,
  author       = {Li Duan and
                  Yong Li and
                  Lijun Liao},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Perfect Anonymous Authentication and Secure Communication in Internet-of-Things},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {190--209},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_14},
  doi          = {10.1007/978-3-031-17510-7\_14},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/DuanLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/DuanLL21a,
  author       = {Li Duan and
                  Yong Li and
                  Lijun Liao},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Flexible Group Non-interactive Key Exchange in the Standard Model},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {210--227},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_15},
  doi          = {10.1007/978-3-031-17510-7\_15},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/DuanLL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/FranckG21,
  author       = {Christian Franck and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Optimized Implementation of {SHA-512} for 16-Bit {MSP430} Microcontrollers},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_7},
  doi          = {10.1007/978-3-031-17510-7\_7},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/FranckG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GusatuO21,
  author       = {Marian Gusatu and
                  Ruxandra F. Olimid},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Improved Security Solutions for DDoS Mitigation in 5G Multi-access
                  Edge Computing},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {286--295},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_19},
  doi          = {10.1007/978-3-031-17510-7\_19},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/GusatuO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Kelesidis21,
  author       = {Evgnosia{-}Alexandra Kelesidis},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {An Optimization of Bleichenbacher's Oracle Padding Attack},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {145--155},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_10},
  doi          = {10.1007/978-3-031-17510-7\_10},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Kelesidis21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/LuLWL21,
  author       = {Xiaojuan Lu and
                  Bohan Li and
                  Shichang Wang and
                  Dongdai Lin},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Conditional Differential Cryptanalysis on Bagua},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {178--189},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_13},
  doi          = {10.1007/978-3-031-17510-7\_13},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/LuLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MaimutT21,
  author       = {Diana Maimut and
                  George Teseleanu},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {New Configurations of Grain Ciphers: Security Against Slide Attacks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {260--285},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_18},
  doi          = {10.1007/978-3-031-17510-7\_18},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MaimutT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MalikSH21,
  author       = {Abdul Saboor Malik and
                  Muhammad Khuram Shahzad and
                  Mehdi Hussain},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {A Forensic Framework for Webmail Threat Detection Using Log Analysis},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {57--69},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_5},
  doi          = {10.1007/978-3-031-17510-7\_5},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MalikSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MinaS21,
  author       = {Mihai{-}Zicu Mina and
                  Emil Simion},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {A Multifunctional Modular Implementation of Grover's Algorithm},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {228--247},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_16},
  doi          = {10.1007/978-3-031-17510-7\_16},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MinaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Neupane21,
  author       = {Kashi Neupane},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Long-Term Secure Asymmetric Group Key Agreement},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {296--307},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_20},
  doi          = {10.1007/978-3-031-17510-7\_20},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Neupane21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Ruangwises21,
  author       = {Suthee Ruangwises},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Using Five Cards to Encode Each Integer in {\textdollar}{\textbackslash}mathbb
                  \{Z\}/6{\textbackslash}mathbb \{Z\}{\textdollar}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {165--177},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_12},
  doi          = {10.1007/978-3-031-17510-7\_12},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Ruangwises21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/SantosG21,
  author       = {Luan Cardoso dos Santos and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic
                  Permutations},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_6},
  doi          = {10.1007/978-3-031-17510-7\_6},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/SantosG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Teseleanu21,
  author       = {George Teseleanu},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Lightweight Swarm Authentication},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {248--259},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_17},
  doi          = {10.1007/978-3-031-17510-7\_17},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Teseleanu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TomaBPDC21,
  author       = {Cristian Toma and
                  Catalin Boja and
                  Marius Popa and
                  Mihai Doinea and
                  Cristian Ciurea},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Viruses, Exploits, Malware and Security Issues on IoT Devices},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {324--334},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_22},
  doi          = {10.1007/978-3-031-17510-7\_22},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/TomaBPDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TripathySS21,
  author       = {Somanath Tripathy and
                  Narendra Singh and
                  Divyanshu N. Singh},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {{ADAM:} Automatic Detection of Android Malware},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_2},
  doi          = {10.1007/978-3-031-17510-7\_2},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/TripathySS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/YeniarasC21,
  author       = {Esra Yeniaras and
                  Murat Cenk},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Improved Polynomial Multiplication Algorithms over Characteristic
                  Three Fields and Applications to {NTRU} Prime},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {125--144},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_9},
  doi          = {10.1007/978-3-031-17510-7\_9},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/YeniarasC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Zentai21,
  author       = {D{\'{a}}niel Zentai},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {{UC} Analysis of the Randomized McEliece Cryptosystem},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {156--164},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_11},
  doi          = {10.1007/978-3-031-17510-7\_11},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Zentai21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ZhangLC21,
  author       = {Xiaona Zhang and
                  Yang Liu and
                  Yu Chen},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Attack on the Common Prime Version of Murru and Saettone's {RSA} Cryptosystem},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {32--45},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_3},
  doi          = {10.1007/978-3-031-17510-7\_3},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/ZhangLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2020,
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-69255-1},
  doi          = {10.1007/978-3-030-69255-1},
  isbn         = {978-3-030-69254-4},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Al-HadhramiCO20,
  author       = {Nasser Al{-}Hadhrami and
                  Matthew Collinson and
                  Nir Oren},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Security Analysis Using Subjective Attack Trees},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {288--301},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_19},
  doi          = {10.1007/978-3-030-69255-1\_19},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Al-HadhramiCO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AlmohamadeCL20,
  author       = {Shurook S. Almohamade and
                  John A. Clark and
                  James Law},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Behaviour-Based Biometrics for Continuous User Authentication to Industrial
                  Collaborative Robots},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {185--197},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_12},
  doi          = {10.1007/978-3-030-69255-1\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/AlmohamadeCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Anada20,
  author       = {Hiroaki Anada},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Decentralized Multi-authority Anonymous Credential System with Bundled
                  Languages on Identifiers},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {71--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_6},
  doi          = {10.1007/978-3-030-69255-1\_6},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Anada20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Baksi20,
  author       = {Anubhab Baksi},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {New Insights on Differential and Linear Bounds Using Mixed Integer
                  Linear Programming},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_4},
  doi          = {10.1007/978-3-030-69255-1\_4},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Baksi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BicaUT20,
  author       = {Ion Bica and
                  Roxana Larisa Unc and
                  Stefan Turcanu},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Virtualization and Automation for Cybersecurity Training and Experimentation},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {227--241},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_15},
  doi          = {10.1007/978-3-030-69255-1\_15},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BicaUT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ChindrisTA20,
  author       = {Mihai{-}Cristian Chindris and
                  Mihai Togan and
                  Stefan{-}Ciprian Arseni},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Secure Speaker Recognition System Using Homomorphic Encryption},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {198--211},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_13},
  doi          = {10.1007/978-3-030-69255-1\_13},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/ChindrisTA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Chou20,
  author       = {Tung Chou},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {An {IND-CCA2} Attack Against the 1st- and 2nd-Round Versions of {NTS-KEM}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_11},
  doi          = {10.1007/978-3-030-69255-1\_11},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Chou20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Geraud-StewartN20,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Elementary Attestation of Cryptographically Useful Composite Moduli},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_1},
  doi          = {10.1007/978-3-030-69255-1\_1},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Geraud-StewartN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Hristea20,
  author       = {Cristian Hristea},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Reliable {RFID} Offline Privacy},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {212--226},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_14},
  doi          = {10.1007/978-3-030-69255-1\_14},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Hristea20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/LiuHQ20,
  author       = {Yuanzhen Liu and
                  Gerhard Petrus Hancke and
                  Umair Mujtaba Qureshi},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Off-the-Shelf Security Testing Platform for Contactless Systems},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_2},
  doi          = {10.1007/978-3-030-69255-1\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/LiuHQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MaimutT20,
  author       = {Diana Maimut and
                  George Teseleanu},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {A New Generalisation of the Goldwasser-Micali Cryptosystem Based on
                  the Gap 2\({}^{\mbox{k}}\)-Residuosity Assumption},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {24--40},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_3},
  doi          = {10.1007/978-3-030-69255-1\_3},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MaimutT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MalinaSRHCH20,
  author       = {Lukas Malina and
                  David Smekal and
                  Sara Ricci and
                  Jan Hajny and
                  Peter C{\'{\i}}bik and
                  Jakub Hrabovsky},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Hardware-Accelerated Cryptography for Software-Defined Networks with
                  {P4}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {271--287},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_18},
  doi          = {10.1007/978-3-030-69255-1\_18},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MalinaSRHCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ManabeO20,
  author       = {Yoshifumi Manabe and
                  Hibiki Ono},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Secure Card-Based Cryptographic Protocols Using Private Operations
                  Against Malicious Players},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_5},
  doi          = {10.1007/978-3-030-69255-1\_5},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/ManabeO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MinaS20,
  author       = {Mihai{-}Zicu Mina and
                  Emil Simion},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {A Scalable Simulation of the {BB84} Protocol Involving Eavesdropping},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {91--109},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_7},
  doi          = {10.1007/978-3-030-69255-1\_7},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MinaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/NaganoA20,
  author       = {Tetsuya Nagano and
                  Hiroaki Anada},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Approach to Cryptography from Differential Geometry with Example},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {110--129},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_8},
  doi          = {10.1007/978-3-030-69255-1\_8},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/NaganoA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Neupane20,
  author       = {Kashi Neupane},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Long-Term Secure Deniable Group Key Establishment},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {242--256},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_16},
  doi          = {10.1007/978-3-030-69255-1\_16},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Neupane20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PanaitO20,
  author       = {Andreea{-}Elena Panait and
                  Ruxandra F. Olimid},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_9},
  doi          = {10.1007/978-3-030-69255-1\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/PanaitO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PeclSMKAM20,
  author       = {David Pecl and
                  Yehor Safonov and
                  Zdenek Martinasek and
                  Matej Kacic and
                  Lubomir Almer and
                  Lukas Malina},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Manager Asks: Which Vulnerability Must be Eliminated First?},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {146--164},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_10},
  doi          = {10.1007/978-3-030-69255-1\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/PeclSMKAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ShinodaMSMS20,
  author       = {Yuto Shinoda and
                  Daiki Miyahara and
                  Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Hideaki Sone},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Card-Based Covert Lottery},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {257--270},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_17},
  doi          = {10.1007/978-3-030-69255-1\_17},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/ShinodaMSMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2019,
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-41025-4},
  doi          = {10.1007/978-3-030-41025-4},
  isbn         = {978-3-030-41024-7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AciobaniteiUP19,
  author       = {Iulian Aciobanitei and
                  Paul{-}Danut Urian and
                  Mihai{-}Lica Pura},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Learned Lessons from Implementing an Android Client for the Cloud
                  Signature Consortium {API}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {227--240},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_15},
  doi          = {10.1007/978-3-030-41025-4\_15},
  timestamp    = {Fri, 06 Mar 2020 14:27:55 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/AciobaniteiUP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AnadaU19,
  author       = {Hiroaki Anada and
                  Yoshifumi Ueshige},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Generic Construction of Anonymous Deniable Predicate Authentication
                  Scheme with Revocability},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {142--155},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_10},
  doi          = {10.1007/978-3-030-41025-4\_10},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/AnadaU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BeunardeauOMNRR19,
  author       = {Marc Beunardeau and
                  Fatima{-}Ezzahra El Orche and
                  Diana Maimut and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Authenticated Key Distribution: When the Coupon Collector is Your
                  Enemy},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_1},
  doi          = {10.1007/978-3-030-41025-4\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BeunardeauOMNRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BicaCAM19,
  author       = {Ion Bica and
                  Bogdan{-}Cosmin Chifor and
                  Stefan{-}Ciprian Arseni and
                  Ioana Matei},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Reputation-Based Security Framework for Internet of Things},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {213--226},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_14},
  doi          = {10.1007/978-3-030-41025-4\_14},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BicaCAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BischofOG19,
  author       = {Mario Bischof and
                  Tobias Oder and
                  Tim G{\"{u}}neysu},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Efficient Microcontroller Implementation of {BIKE}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {34--49},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_3},
  doi          = {10.1007/978-3-030-41025-4\_3},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BischofOG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/CostiucMT19,
  author       = {Mariana Costiuc and
                  Diana Maimut and
                  George Teseleanu},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Physical Cryptography},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_11},
  doi          = {10.1007/978-3-030-41025-4\_11},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/CostiucMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/CrescenzoCK19,
  author       = {Giovanni Di Crescenzo and
                  Brian A. Coan and
                  Jonathan Kirsch},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Secure Deterministic Automata Evaluation: Completeness and Efficient
                  2-party Protocols},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {50--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_4},
  doi          = {10.1007/978-3-030-41025-4\_4},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/CrescenzoCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/CrescenzoSSY19,
  author       = {Giovanni Di Crescenzo and
                  Abhrajit Sengupta and
                  Ozgur Sinanoglu and
                  Muhammad Yasin},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation
                  from a Tamper-Proof Memory},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {172--192},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_12},
  doi          = {10.1007/978-3-030-41025-4\_12},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/CrescenzoSSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/JichiciGM19,
  author       = {Camil Jichici and
                  Bogdan Groza and
                  Pal{-}Stefan Murvay},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Integrating Adversary Models and Intrusion Detection Systems for In-vehicle
                  Networks in CANoe},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_16},
  doi          = {10.1007/978-3-030-41025-4\_16},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/JichiciGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KanekoYSTKO19,
  author       = {Satomi Kaneko and
                  Akira Yamada and
                  Yukiko Sawaya and
                  Tran Phuong Thao and
                  Ayumu Kubota and
                  Kazumasa Omote},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Detecting Malicious Websites by Query Templates},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_5},
  doi          = {10.1007/978-3-030-41025-4\_5},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/KanekoYSTKO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Laniado19,
  author       = {Natacha Sylvie Laniado},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {The Ups and Downs of Technology in Society},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {21--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_2},
  doi          = {10.1007/978-3-030-41025-4\_2},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Laniado19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MaimutM19,
  author       = {Diana Maimut and
                  Alexandru Stefan Mega},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Speeding up {OMD} Instantiations in Hardware},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {193--212},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_13},
  doi          = {10.1007/978-3-030-41025-4\_13},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MaimutM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MalinaRDSHG19,
  author       = {Lukas Malina and
                  Sara Ricci and
                  Petr Dzurenda and
                  David Smekal and
                  Jan Hajny and
                  Tomas Gerlich},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Towards Practical Deployment of Post-quantum Cryptography on Constrained
                  Platforms and Hardware-Accelerated Platforms},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_8},
  doi          = {10.1007/978-3-030-41025-4\_8},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MalinaRDSHG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Rasoamiaramanana19,
  author       = {Sandra Rasoamiaramanana and
                  Gilles Macario{-}Rat and
                  Marine Minier},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {White-Box Traitor-Tracing from Tardos Probabilistic Codes},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {125--141},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_9},
  doi          = {10.1007/978-3-030-41025-4\_9},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Rasoamiaramanana19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/YashiroHKS19,
  author       = {Risa Yashiro and
                  Yohei Hori and
                  Toshihiro Katashita and
                  Kazuo Sakiyama},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {A Deep Learning Attack Countermeasure with Intentional Noise for a
                  PUF-Based Authentication Scheme},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {78--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_6},
  doi          = {10.1007/978-3-030-41025-4\_6},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/YashiroHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ZitouniM19,
  author       = {Mohammed Zitouni and
                  Farid Mokrane},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Implementing Cryptography Pairings over Ordinary Pairing-Friendly
                  Curves of Type y\({}^{\mbox{2}}\) = x\({}^{\mbox{5}}\) +a, x},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {95--108},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_7},
  doi          = {10.1007/978-3-030-41025-4\_7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/ZitouniM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2018,
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12942-2},
  doi          = {10.1007/978-3-030-12942-2},
  isbn         = {978-3-030-12941-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AbedCGA18,
  author       = {Leith Abed and
                  Nathan L. Clarke and
                  Bogdan V. Ghita and
                  Abdulrahman Alruban},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Securing Cloud Storage by Transparent Biometric Cryptography},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_9},
  doi          = {10.1007/978-3-030-12942-2\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/AbedCGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AhgueNEFMB18,
  author       = {Augustin Ousmanou Ahgue and
                  Jean De Dieu Nkapkop and
                  Joseph Yves Effa and
                  Samuel Franz and
                  Raul Malutan and
                  Monica Borda},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {443--457},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_33},
  doi          = {10.1007/978-3-030-12942-2\_33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/AhgueNEFMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AlyasiriCK18,
  author       = {Hasanen Alyasiri and
                  John A. Clark and
                  Daniel Kudenko},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Evolutionary Computation Algorithms for Detecting Known and Unknown
                  Attacks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {170--184},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_14},
  doi          = {10.1007/978-3-030-12942-2\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/AlyasiriCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BarcauPP18,
  author       = {Mugurel Barcau and
                  Vicentiu Pasol and
                  Cezar Plesca},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Monoidal Encryption over ({\textbackslash}mathbb F{\_}2, {\textbackslash}cdot
                  {)} {(} {F} 2 , {\(\cdot\)} {)}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {504--517},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_37},
  doi          = {10.1007/978-3-030-12942-2\_37},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BarcauPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BodoarcaP18,
  author       = {Stefan Bodoarca and
                  Mihai{-}Lica Pura},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Assuring Privacy in Surfing the Internet},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_15},
  doi          = {10.1007/978-3-030-12942-2\_15},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BodoarcaP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Bolboceanu18,
  author       = {Madalina Bolboceanu},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Relating Different Polynomial-LWE Problems},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {492--503},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_36},
  doi          = {10.1007/978-3-030-12942-2\_36},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Bolboceanu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BruneauDFGHHK018,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley and
                  Soshi Hamaguchi and
                  Yohei Hori and
                  Yousung Kang and
                  Alexander Schaub},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Development of the Unified Security Requirements of PUFs During the
                  Standardization Process},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {314--330},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_24},
  doi          = {10.1007/978-3-030-12942-2\_24},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BruneauDFGHHK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ChengDG18,
  author       = {Hao Cheng and
                  Daniel Dinu and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Efficient Implementation of the {SHA-512} Hash Function for 8-Bit
                  {AVR} Microcontrollers},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {273--287},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_21},
  doi          = {10.1007/978-3-030-12942-2\_21},
  timestamp    = {Tue, 11 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/ChengDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/CraciunMS18,
  author       = {Vlad Constantin Craciun and
                  Andrei Mogage and
                  Emil Simion},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Trends in Design of Ransomware Viruses},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {259--272},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_20},
  doi          = {10.1007/978-3-030-12942-2\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/CraciunMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/DArco18,
  author       = {Paolo D'Arco},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_1},
  doi          = {10.1007/978-3-030-12942-2\_1},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/DArco18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/DragoiBB18,
  author       = {Vlad Dragoi and
                  Valeriu Beiu and
                  Dominic Bucerzan},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Vulnerabilities of the McEliece Variants Based on Polar Codes},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {376--390},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_29},
  doi          = {10.1007/978-3-030-12942-2\_29},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/DragoiBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/FaconGLMP18,
  author       = {Adrien Facon and
                  Sylvain Guilley and
                  Matthieu Lec'Hvien and
                  Damien Marion and
                  Thomas Perianin},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Binary Data Analysis for Source Code Leakage Assessment},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {391--409},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_30},
  doi          = {10.1007/978-3-030-12942-2\_30},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/FaconGLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/FaisalE18,
  author       = {Islam Faisal and
                  Sherif El{-}Kassas},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Limited Proxying for Content Filtering Based on {X.509} Proxy Certificate
                  Profile},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {218--233},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_17},
  doi          = {10.1007/978-3-030-12942-2\_17},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/FaisalE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/HristeaT18,
  author       = {Cristian Hristea and
                  Ferucio Laurentiu Tiplea},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {A PUF-Based Destructive Private Mutual Authentication {RFID} Protocol},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {331--343},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_25},
  doi          = {10.1007/978-3-030-12942-2\_25},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/HristeaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/JichiciGM18,
  author       = {Camil Jichici and
                  Bogdan Groza and
                  Pal{-}Stefan Murvay},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Examining the Use of Neural Networks for Intrusion Detection in Controller
                  Area Networks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {109--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_10},
  doi          = {10.1007/978-3-030-12942-2\_10},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/JichiciGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KakisimNCS18,
  author       = {Arzu Gorgulu Kakisim and
                  Mert Nar and
                  Necmettin Carkaci and
                  Ibrahim Sogukpinar},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Analysis and Evaluation of Dynamic Feature-Based Malware Detection
                  Methods},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {247--258},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_19},
  doi          = {10.1007/978-3-030-12942-2\_19},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/KakisimNCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KulikTB18,
  author       = {Tomas Kulik and
                  Peter W. V. Tran{-}J{\o}rgensen and
                  Jalil Boudjadar},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Formal Security Analysis of Cloud-Connected Industrial Control Systems},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {71--84},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_7},
  doi          = {10.1007/978-3-030-12942-2\_7},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/KulikTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Lalande18,
  author       = {Jean{-}Fran{\c{c}}ois Lalande},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Android Malware Analysis: From Technical Difficulties to Scientific
                  Challenges},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {17--21},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_2},
  doi          = {10.1007/978-3-030-12942-2\_2},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Lalande18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MaimutS18,
  author       = {Diana Maimut and
                  Emil Simion},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Post-quantum Cryptography and a (Qu)Bit More},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {22--28},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_3},
  doi          = {10.1007/978-3-030-12942-2\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MaimutS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MaimutT18,
  author       = {Diana Maimut and
                  George Teseleanu},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {A Unified Security Perspective on Legally Fair Contract Signing Protocols},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {477--491},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_35},
  doi          = {10.1007/978-3-030-12942-2\_35},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MaimutT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MangirCM18,
  author       = {Ceyda Mangir and
                  Murat Cenk and
                  Murat Manguoglu},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {An Improved Algorithm for Iterative Matrix-Vector Multiplications
                  over Finite Fields},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {358--367},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_27},
  doi          = {10.1007/978-3-030-12942-2\_27},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MangirCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MelchorKLR18,
  author       = {Carlos Aguilar Melchor and
                  Marc{-}Olivier Killijian and
                  C{\'{e}}dric Lefebvre and
                  Thomas Ricosset},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {A Comparison of the Homomorphic Encryption Libraries HElib, {SEAL}
                  and FV-NFLlib},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {425--442},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_32},
  doi          = {10.1007/978-3-030-12942-2\_32},
  timestamp    = {Fri, 08 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/MelchorKLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/NishigamiI18,
  author       = {Koki Nishigami and
                  Keiichi Iwamura},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Geometric Pairwise Key-Sharing Scheme},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {518--528},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_38},
  doi          = {10.1007/978-3-030-12942-2\_38},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/NishigamiI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/NitaM18,
  author       = {Stefania Loredana Nita and
                  Marius Iulian Mihailescu},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {A Hybrid Searchable Encryption Scheme for Cloud Computing},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_8},
  doi          = {10.1007/978-3-030-12942-2\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/NitaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/OuairyBL18,
  author       = {L{\'{e}}opold Ouairy and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Jean{-}Louis Lanet},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Normalization of Java Source Codes},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {29--40},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_4},
  doi          = {10.1007/978-3-030-12942-2\_4},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/OuairyBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PuuskaKAH18,
  author       = {Samir Puuska and
                  Tero Kokkonen and
                  Janne Alatalo and
                  Eppu Heilimo},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial
                  Autoencoders},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {234--246},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_18},
  doi          = {10.1007/978-3-030-12942-2\_18},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/PuuskaKAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/RantosDDIPK18,
  author       = {Konstantinos Rantos and
                  George Drosatos and
                  Konstantinos Demertzis and
                  Christos Ilioudis and
                  Alexandros Papanikolaou and
                  Antonios Kritsas},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {ADvoCATE: {A} Consent Management Platform for Personal Data Processing
                  in the IoT Using Blockchain Technology},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {300--313},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_23},
  doi          = {10.1007/978-3-030-12942-2\_23},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/RantosDDIPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/RezvyPLZ18,
  author       = {Shahadate Rezvy and
                  Miltos Petridis and
                  Aboubaker Lasebae and
                  Tahmina Zebin},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Intrusion Detection and Classification with Autoencoded Deep Neural
                  Network},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {142--156},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_12},
  doi          = {10.1007/978-3-030-12942-2\_12},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/RezvyPLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Schipor18,
  author       = {Adrian G. Schipor},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {On the Security of Jhanwar-Barua Identity-Based Encryption Scheme},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {368--375},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_28},
  doi          = {10.1007/978-3-030-12942-2\_28},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Schipor18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/SinghHK18,
  author       = {Isha Singh and
                  Silke Holtmanns and
                  Raimo Kantola},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Roaming Interface Signaling Security for {LTE} Networks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {204--217},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_16},
  doi          = {10.1007/978-3-030-12942-2\_16},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/SinghHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/SporiciCC18,
  author       = {Dan Sporici and
                  Mihai{-}Daniel Chiroiu and
                  Dan Cioc{\^{\i}}rlan},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {An Evaluation of {OCR} Systems Against Adversarial Machine Learning},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_11},
  doi          = {10.1007/978-3-030-12942-2\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/SporiciCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Talif18,
  author       = {Victor{-}Mihai Talif},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Implementing Searchable Encryption Schemes over Multilinear Maps},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {458--476},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_34},
  doi          = {10.1007/978-3-030-12942-2\_34},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Talif18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TezukaYT18,
  author       = {Masayuki Tezuka and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Weakened Random Oracle Models with Target Prefix},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {344--357},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_26},
  doi          = {10.1007/978-3-030-12942-2\_26},
  timestamp    = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/TezukaYT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TomaTBPIZ18,
  author       = {Cristian Toma and
                  Bogdan Talpiga and
                  Catalin Boja and
                  Marius Popa and
                  Bogdan Iancu and
                  Madalina Zurini},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Secure IoT Supply Chain Management Solution Using Blockchain and Smart
                  Contracts Technology},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {288--299},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_22},
  doi          = {10.1007/978-3-030-12942-2\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/TomaTBPIZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/VelciuSC18,
  author       = {Veronica Velciu and
                  Florin{-}Alexandru Stancu and
                  Mihai Chiroiu},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {HiddenApp - Securing Linux Applications Using {ARM} TrustZone},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {41--52},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_5},
  doi          = {10.1007/978-3-030-12942-2\_5},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/VelciuSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/WangPGJ18,
  author       = {Zihao Wang and
                  ShuangHe Peng and
                  XinYue Guo and
                  Wenbin Jiang},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel
                  Attacks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {410--424},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_31},
  doi          = {10.1007/978-3-030-12942-2\_31},
  timestamp    = {Sat, 13 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/WangPGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/WenKK18,
  author       = {Shao{-}Fang Wen and
                  Mazaher Kianpour and
                  Basel Katt},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Security Knowledge Management in Open Source Software Communities},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_6},
  doi          = {10.1007/978-3-030-12942-2\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/WenKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/YaminK18,
  author       = {Muhammad Mudassar Yamin and
                  Basel Katt},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Detecting Malicious Windows Commands Using Natural Language Processing
                  Techniques},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {157--169},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_13},
  doi          = {10.1007/978-3-030-12942-2\_13},
  timestamp    = {Fri, 08 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/YaminK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BarcauPPT17,
  author       = {Mugurel Barcau and
                  Vicentiu Pasol and
                  Cezar Plesca and
                  Mihai Togan},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {On a Key Exchange Protocol},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_13},
  doi          = {10.1007/978-3-319-69284-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BarcauPPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BrierGN17,
  author       = {{\'{E}}ric Brier and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Exploring Naccache-Stern Knapsack Encryption},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {67--82},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_6},
  doi          = {10.1007/978-3-319-69284-5\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BrierGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BucerzanDK17,
  author       = {Dominic Bucerzan and
                  Vlad Dragoi and
                  Herv{\'{e}} Tal{\'{e}} Kalachi},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Evolution of the McEliece Public Key Encryption Scheme},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {129--149},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_10},
  doi          = {10.1007/978-3-319-69284-5\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BucerzanDK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/FreudenthalW17,
  author       = {Margus Freudenthal and
                  Jan Willemson},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Challenges of Federating National Data Access Infrastructures},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_8},
  doi          = {10.1007/978-3-319-69284-5\_8},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/FreudenthalW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GuilleyHTR17,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Ming Tang and
                  Olivier Rioul},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {12--27},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_2},
  doi          = {10.1007/978-3-319-69284-5\_2},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GuilleyHTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GurulianMSFA17,
  author       = {Iakovos Gurulian and
                  Konstantinos Markantonakis and
                  Carlton Shepherd and
                  Eibe Frank and
                  Raja Naeem Akram},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Proximity Assurances Based on Natural and Artificial Ambient Environments},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {83--103},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_7},
  doi          = {10.1007/978-3-319-69284-5\_7},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/GurulianMSFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KrzywieckiS17,
  author       = {Lukasz Krzywiecki and
                  Marcin Slowik},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Strongly Deniable Identification Schemes Immune to Prover's and Verifier's
                  Ephemeral Leakage},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {115--128},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_9},
  doi          = {10.1007/978-3-319-69284-5\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/KrzywieckiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MaimutT17,
  author       = {Diana Maimut and
                  George Teseleanu},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Secretly Embedding Trapdoors into Contract Signing Protocols},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {166--186},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_12},
  doi          = {10.1007/978-3-319-69284-5\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MaimutT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Orlandi17,
  author       = {Claudio Orlandi},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Faster Zero-Knowledge Protocols and Applications - (Invited Talk Abstract)},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_1},
  doi          = {10.1007/978-3-319-69284-5\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Orlandi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Ryan17,
  author       = {Peter Y. A. Ryan},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Securing the Foundations of Democracy},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {52--66},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_5},
  doi          = {10.1007/978-3-319-69284-5\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Ryan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/SasakiT17,
  author       = {Yu Sasaki and
                  Yosuke Todo},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {New Algorithm for Modeling S-box in {MILP} Based Differential and
                  Division Trail Search},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {150--165},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_11},
  doi          = {10.1007/978-3-319-69284-5\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/SasakiT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TipleaDN17,
  author       = {Ferucio Laurentiu Tiplea and
                  Constantin Catalin Dragan and
                  Anca{-}Maria Nica},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Key-Policy Attribute-Based Encryption from Bilinear Maps},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {28--42},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_3},
  doi          = {10.1007/978-3-319-69284-5\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/TipleaDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Vergnaud17,
  author       = {Damien Vergnaud},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Security of Pseudo-Random Number Generators with Input - (Invited
                  Talk)},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {43--51},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_4},
  doi          = {10.1007/978-3-319-69284-5\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Vergnaud17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2017,
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5},
  doi          = {10.1007/978-3-319-69284-5},
  isbn         = {978-3-319-69283-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BarbulescuSTS16,
  author       = {Mihai Barbulescu and
                  Adrian Stratulat and
                  Vlad Traista{-}Popescu and
                  Emil Simion},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {{RSA} Weak Public Keys Available on the Internet},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {92--102},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_6},
  doi          = {10.1007/978-3-319-47238-6\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BarbulescuSTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BockDL16,
  author       = {Estuardo Alpirez Bock and
                  Zoya Dyka and
                  Peter Langend{\"{o}}rfer},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Increasing the Robustness of the Montgomery kP-Algorithm Against {SCA}
                  by Modifying Its Initialization},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {167--178},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_12},
  doi          = {10.1007/978-3-319-47238-6\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BockDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/DArcoP16,
  author       = {Paolo D'Arco and
                  Roberto De Prisco},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Visual Cryptography - Models, Issues, Applications and New Directions},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {20--39},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_2},
  doi          = {10.1007/978-3-319-47238-6\_2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/DArcoP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/DurakV16,
  author       = {F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Circular Security Reconsidered},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {3--19},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_1},
  doi          = {10.1007/978-3-319-47238-6\_1},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/DurakV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/FarhadiL16,
  author       = {Mozhdeh Farhadi and
                  Jean{-}Louis Lanet},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Paper Tigers: An Endless Fight},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {40--62},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_3},
  doi          = {10.1007/978-3-319-47238-6\_3},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/FarhadiL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GhimesP16,
  author       = {Ana{-}Maria Ghimes and
                  Victor Valeriu Patriciu},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Proposed Scheme for Data Confidentiality and Access Control in Cloud
                  Computing},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {274--285},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_20},
  doi          = {10.1007/978-3-319-47238-6\_20},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GhimesP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Hirose16,
  author       = {Shoichi Hirose},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {May-Ozerov Algorithm for Nearest-Neighbor Problem over {\(\mathbb{F}\)}\({}_{\mbox{q}}\)
                  and Its Application to Information Set Decoding},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {115--126},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_8},
  doi          = {10.1007/978-3-319-47238-6\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Hirose16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/HiroseY16,
  author       = {Shoichi Hirose and
                  Atsushi Yabumoto},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {A Tweak for a {PRF} Mode of a Compression Function and Its Applications},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {103--114},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_7},
  doi          = {10.1007/978-3-319-47238-6\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/HiroseY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/IancuS16,
  author       = {Bogdan Iancu and
                  Cristian Sandu},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {A Cryptographic Approach for Implementing Semantic Web's Trust Layer},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {127--136},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_9},
  doi          = {10.1007/978-3-319-47238-6\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/IancuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Krzywiecki16,
  author       = {Lukasz Krzywiecki},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Schnorr-Like Identification Scheme Resistant to Malicious Subliminal
                  Setting of Ephemeral Secret},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {137--148},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_10},
  doi          = {10.1007/978-3-319-47238-6\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Krzywiecki16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/LutasCLL16,
  author       = {Dan Lutas and
                  Adrian Colesa and
                  S{\'{a}}ndor Luk{\'{a}}cs and
                  Andrei Lutas},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {193--208},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_14},
  doi          = {10.1007/978-3-319-47238-6\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/LutasCLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MarghescuS16,
  author       = {Andrei Marghescu and
                  Paul Svasta},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Pushing the Optimization Limits of Ring Oscillator-Based True Random
                  Number Generators},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {209--224},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_15},
  doi          = {10.1007/978-3-319-47238-6\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MarghescuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Neupane16,
  author       = {Kashi Neupane},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Long-Term Secure One-Round Group Key Establishment from Multilinear
                  Mappings},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {81--91},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_5},
  doi          = {10.1007/978-3-319-47238-6\_5},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Neupane16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PanaitPSVS16,
  author       = {Ioana{-}Cristina Panait and
                  Cristian Pop and
                  Alexandru Sirbu and
                  Adelina Vidovici and
                  Emil Simion},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {{TOR} - Didactic Pluggable Transport},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {225--239},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_16},
  doi          = {10.1007/978-3-319-47238-6\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/PanaitPSVS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PatrascuP16,
  author       = {Alecsandru Patrascu and
                  Stefan Popa},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {When Pythons Bite},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {181--192},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_13},
  doi          = {10.1007/978-3-319-47238-6\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/PatrascuP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PlescaTL16,
  author       = {Cezar Plesca and
                  Mihai Togan and
                  Cristian Lupascu},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Homomorphic Encryption Based on Group Algebras and Goldwasser-Micali
                  Scheme},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {149--166},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_11},
  doi          = {10.1007/978-3-319-47238-6\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/PlescaTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PourghomiSA16,
  author       = {Pardis Pourghomi and
                  Muhammad Qasim Saeed and
                  Pierre E. Abi{-}Char},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Secure Transaction Authentication Protocol},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {261--273},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_19},
  doi          = {10.1007/978-3-319-47238-6\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/PourghomiSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Radu16,
  author       = {Sabina Georgiana Radu},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Comparative Analysis of Security Operations Centre Architectures;
                  Proposals and Architectural Considerations for Frameworks and Operating
                  Models},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {248--260},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_18},
  doi          = {10.1007/978-3-319-47238-6\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Radu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TipleaITN16,
  author       = {Ferucio Laurentiu Tiplea and
                  Sorin Iftene and
                  George Teseleanu and
                  Anca{-}Maria Nica},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Security of Identity-Based Encryption Schemes from Quadratic Residues},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {63--77},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_4},
  doi          = {10.1007/978-3-319-47238-6\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/TipleaITN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/WittkeDSL16,
  author       = {Christian Wittke and
                  Zoya Dyka and
                  Oliver Skibitzki and
                  Peter Langend{\"{o}}rfer},
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Preparation of {SCA} Attacks: Successfully Decapsulating {BGA} Packages},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  pages        = {240--247},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6\_17},
  doi          = {10.1007/978-3-319-47238-6\_17},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/WittkeDSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2016,
  editor       = {Ion Bica and
                  Reza Reyhanitabar},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 9th International Conference, {SECITC} 2016, Bucharest, Romania,
                  June 9-10, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10006},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47238-6},
  doi          = {10.1007/978-3-319-47238-6},
  isbn         = {978-3-319-47237-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/0002K15,
  author       = {Vimal Kumar and
                  Rakesh Kumar},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {A Cooperative Black Hole Node Detection and Mitigation Approach for
                  MANETs},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {171--183},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_12},
  doi          = {10.1007/978-3-319-27179-8\_12},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/0002K15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Anandakumar15,
  author       = {N. Nalla Anandakumar},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {{SCA} Resistance Analysis on {FPGA} Implementations of Sponge Based
                  {\textbackslash}mathttMAC-{\textbackslash}mathttPHOTON},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {69--86},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_6},
  doi          = {10.1007/978-3-319-27179-8\_6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Anandakumar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BalaniciTBM15,
  author       = {Dumitru Balanici and
                  Vlad Tomsa and
                  Monica Borda and
                  Raul Malutan},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Full Duplex {OTP} Cryptosystem Based on {DNA} Key for Text Transmissions},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {39--48},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_3},
  doi          = {10.1007/978-3-319-27179-8\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BalaniciTBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BarahtianCPLC15,
  author       = {Oana Barahtian and
                  Mihai Cuciuc and
                  Lucian Petcana and
                  Catalin Adrian Leordeanu and
                  Valentin Cristea},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Evaluation of Lightweight Block Ciphers for Embedded Systems},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_4},
  doi          = {10.1007/978-3-319-27179-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BarahtianCPLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BrierCGMN15,
  author       = {Eric Brier and
                  Jean{-}S{\'{e}}bastien Coron and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {A Number-Theoretic Error-Correcting Code},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {25--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_2},
  doi          = {10.1007/978-3-319-27179-8\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BrierCGMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BucerzanR15,
  author       = {Dominic Bucerzan and
                  Crina Ratiu},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Contributions to Steganographic Techniques on Mobile Devices},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {242--252},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_17},
  doi          = {10.1007/978-3-319-27179-8\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BucerzanR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GeraudMNCS15,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Diana{-}Stefania Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Emil Simion},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Applying Cryptographic Acceleration Techniques to Error Correction},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {150--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_11},
  doi          = {10.1007/978-3-319-27179-8\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GeraudMNCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GlavanPS15,
  author       = {Ionela Roxana Glavan and
                  Daniel Petcu and
                  Emil Simion},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {{CART} Versus {CHAID} Behavioral Biometric Parameter Segmentation
                  Analysis},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {59--68},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_5},
  doi          = {10.1007/978-3-319-27179-8\_5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GlavanPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MarkantonakisAM15,
  author       = {Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Mehari G. Msgna},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Secure and Trusted Application Execution on Embedded Devices},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_1},
  doi          = {10.1007/978-3-319-27179-8\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MarkantonakisAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MirskyCS15,
  author       = {Yisroel Mirsky and
                  Noam Cohen and
                  Asaf Shabtai},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Up-High to Down-Low: Applying Machine Learning to an Exploit Database},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {184--200},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_13},
  doi          = {10.1007/978-3-319-27179-8\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MirskyCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MoradS15,
  author       = {Idan Morad and
                  Asaf Shabtai},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Detecting Computers in Cyber Space Maliciously Exploited as {SSH}
                  Proxies},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {201--211},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_14},
  doi          = {10.1007/978-3-319-27179-8\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MoradS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/NastaseT15,
  author       = {George{-}Daniel Nastase and
                  Ferucio Laurentiu Tiplea},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {On a Lightweight Authentication Protocol for {RFID}},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {212--225},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_15},
  doi          = {10.1007/978-3-319-27179-8\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/NastaseT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/NkapkopEBT15,
  author       = {Jean De Dieu Nkapkop and
                  Joseph Yves Effa and
                  Monica Borda and
                  Romulus Terebes},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_7},
  doi          = {10.1007/978-3-319-27179-8\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/NkapkopEBT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/OmerasevicBM15,
  author       = {Damir Omerasevic and
                  Narcis Behlilovic and
                  Sasa Mrdovic},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {A Novel Key Management for Virtually Limitless Key Size},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {102--118},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_8},
  doi          = {10.1007/978-3-319-27179-8\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/OmerasevicBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PatrascuBP15,
  author       = {Alecsandru Patrascu and
                  Ion Bica and
                  Victor Valeriu Patriciu},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Spam Filtering Using Automated Classifying Services over a Cloud Computing
                  Infrastructure},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_16},
  doi          = {10.1007/978-3-319-27179-8\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/PatrascuBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/PlescaMT15,
  author       = {Cezar Plesca and
                  Luciana Morogan and
                  Mihai Togan},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Fast Searching in Image Databases Using Multi-index Robust Fingerprinting},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {267--279},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_19},
  doi          = {10.1007/978-3-319-27179-8\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/PlescaMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/RosiaCT15,
  author       = {Nicolae Rosia and
                  Virgil Cervicescu and
                  Mihai Togan},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Efficient Montgomery Multiplication on GPUs},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {119--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_9},
  doi          = {10.1007/978-3-319-27179-8\_9},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/RosiaCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ShanmugamA15,
  author       = {Dillibabu Shanmugam and
                  Suganya Annadurai},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Secure Implementation of Stream Cipher: Trivium},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {253--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_18},
  doi          = {10.1007/978-3-319-27179-8\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/ShanmugamA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Vivek15,
  author       = {S. Sree Vivek},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Stateful Certificateless Public Key Encryption with Application in
                  Public Cloud},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_10},
  doi          = {10.1007/978-3-319-27179-8\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Vivek15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2015,
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8},
  doi          = {10.1007/978-3-319-27179-8},
  isbn         = {978-3-319-27178-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics