Pub Date : 2020-11-19DOI: 10.1007/978-3-030-69255-1_6
Hiroaki Anada
{"title":"Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers","authors":"Hiroaki Anada","doi":"10.1007/978-3-030-69255-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-69255-1_6","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116143518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1007/978-3-031-17510-7_12
Suthee Ruangwises
{"title":"Using Five Cards to Encode Each Integer in $mathbb {Z}/6mathbb {Z}$","authors":"Suthee Ruangwises","doi":"10.1007/978-3-031-17510-7_12","DOIUrl":"https://doi.org/10.1007/978-3-031-17510-7_12","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"668 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122620319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-06DOI: 10.1007/978-3-031-32636-3_14
Lukasz Lapczyk, D. Skillicorn
{"title":"Activity Detection from Encrypted Remote Desktop Protocol Traffic","authors":"Lukasz Lapczyk, D. Skillicorn","doi":"10.1007/978-3-031-32636-3_14","DOIUrl":"https://doi.org/10.1007/978-3-031-32636-3_14","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128223746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.1007/978-3-030-41025-4_8
L. Malina, Sara Ricci, Petr Dzurenda, D. Smekal, J. Hajny, Tomas Gerlich
{"title":"Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms","authors":"L. Malina, Sara Ricci, Petr Dzurenda, D. Smekal, J. Hajny, Tomas Gerlich","doi":"10.1007/978-3-030-41025-4_8","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_8","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.1007/978-3-030-41025-4_4
G. D. Crescenzo, B. Coan, J. Kirsch
{"title":"Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols","authors":"G. D. Crescenzo, B. Coan, J. Kirsch","doi":"10.1007/978-3-030-41025-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_4","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130176096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.1007/978-3-030-41025-4_2
Natacha Sylvie Laniado
{"title":"The Ups and Downs of Technology in Society","authors":"Natacha Sylvie Laniado","doi":"10.1007/978-3-030-41025-4_2","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_2","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.1007/978-3-030-41025-4_3
Mario Bischof, Tobias Oder, T. Güneysu
{"title":"Efficient Microcontroller Implementation of BIKE","authors":"Mario Bischof, Tobias Oder, T. Güneysu","doi":"10.1007/978-3-030-41025-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_3","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.1007/978-3-030-41025-4_9
Sandra Rasoamiaramanana, Gilles Macario-Rat, M. Minier
{"title":"White-Box Traitor-Tracing from Tardos Probabilistic Codes","authors":"Sandra Rasoamiaramanana, Gilles Macario-Rat, M. Minier","doi":"10.1007/978-3-030-41025-4_9","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_9","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.1007/978-3-030-41025-4_6
Risa Yashiro, Y. Hori, T. Katashita, K. Sakiyama
{"title":"A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme","authors":"Risa Yashiro, Y. Hori, T. Katashita, K. Sakiyama","doi":"10.1007/978-3-030-41025-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_6","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122742735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.1007/978-3-030-41025-4_12
G. D. Crescenzo, A. Sengupta, O. Sinanoglu, Muhammad Yasin
{"title":"Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory","authors":"G. D. Crescenzo, A. Sengupta, O. Sinanoglu, Muhammad Yasin","doi":"10.1007/978-3-030-41025-4_12","DOIUrl":"https://doi.org/10.1007/978-3-030-41025-4_12","url":null,"abstract":"","PeriodicalId":134979,"journal":{"name":"International Conference on Security for Information Technology and Communications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127245658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}