Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10543)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: SecITC 2017.
Buy print copy
About this book
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
Similar content being viewed by others
Keywords
- access control
- authentication
- block ciphers
- computer programming
- cryptography
- embedded systems
- encryption
- finite element method
- integer programming
- linear programming
- lyapunov methods
- network security
- project management
- public key cryptography
- regression analysis
- security issues
- security model
- security systems
- software engineering
Table of contents (13 papers)
Other volumes
-
Innovative Security Solutions for Information Technology and Communications
Editors and Affiliations
Bibliographic Information
Book Title: Innovative Security Solutions for Information Technology and Communications
Book Subtitle: 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers
Editors: Pooya Farshim, Emil Simion
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-69284-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-69283-8Published: 29 October 2017
eBook ISBN: 978-3-319-69284-5Published: 27 October 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 201
Number of Illustrations: 35 b/w illustrations
Topics: Systems and Data Security, Data Structures and Information Theory, Computer Communication Networks, Computer System Implementation, Special Purpose and Application-Based Systems, Mathematics of Computing