Skip to main content
  • Conference proceedings
  • © 2016

Innovative Security Solutions for Information Technology and Communications

9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10006)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SecITC: International Conference on Information Technology and Communications Security

Conference proceedings info: SECITC 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

    Pages I-X
  2. Invited Talks

    1. Front Matter

      Pages 1-1
    2. Circular Security Reconsidered

      • F. Betül Durak, Serge Vaudenay
      Pages 3-19
    3. Visual Cryptography

      • Paolo D’Arco, Roberto De Prisco
      Pages 20-39
    4. Paper Tigers: An Endless Fight

      • Mozhdeh Farhadi, Jean-Louis Lanet
      Pages 40-62
    5. Security of Identity-Based Encryption Schemes from Quadratic Residues

      • Ferucio Laurenţiu Ţiplea, Sorin Iftene, George Teşeleanu, Anca-Maria Nica
      Pages 63-77
  3. Cryptographic Algorithms and Protocols

    1. Front Matter

      Pages 79-79
    2. RSA Weak Public Keys Available on the Internet

      • Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion
      Pages 92-102
    3. A Tweak for a PRF Mode of a Compression Function and Its Applications

      • Shoichi Hirose, Atsushi Yabumoto
      Pages 103-114
    4. Homomorphic Encryption Based on Group Algebras and Goldwasser-Micali Scheme

      • Cezar Pleşca, Mihai Togan, Cristian Lupaşcu
      Pages 149-166
    5. Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization

      • Estuardo Alpirez Bock, Zoya Dyka, Peter Langendoerfer
      Pages 167-178
  4. Security Technologies for ITC

    1. Front Matter

      Pages 179-179
    2. When Pythons Bite

      • Alecsandru Pătraşcu, Ştefan Popa
      Pages 181-192
    3. Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations

      • Dan Luţaş, Adrian Coleşa, Sándor Lukács, Andrei Luţaş
      Pages 193-208
    4. TOR - Didactic Pluggable Transport

      • Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion
      Pages 225-239

Other Volumes

  1. Innovative Security Solutions for Information Technology and Communications

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016.

The 16 revised full papers were carefully reviewed and selected from 35 submissions. In addition with 4 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, and Security Technologies for ITC.

Editors and Affiliations

  • Military Technical Academy , Bucharest, Romania

    Ion Bica

  • NEC Laboratories Europe , Heidelberg, Germany

    Reza Reyhanitabar

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access