TY - BOOK AU - Manulis,Mark AU - Maimuţ,Diana AU - Teşeleanu,George ED - SpringerLink (Online service) TI - Innovative Security Solutions for Information Technology and Communications: 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers T2 - Lecture Notes in Computer Science, SN - 9783031529474 AV - QA76.9.A25 U1 - 005.8 23 PY - 2024/// CY - Cham PB - Springer Nature Switzerland, Imprint: Springer KW - Data protection KW - Information technology KW - Management KW - Computer networks KW - Security measures KW - Computer networks  KW - Data and Information Security KW - Computer Application in Administrative Data Processing KW - Security Services KW - Mobile and Network Security KW - Computer Communication Networks N1 - BASS: Boolean Automorphisms Signature Scheme -- Shpilrain Using Page Offsets for Detecting Control-Flow Anomalies -- Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes -- SDVS Sender-Privacy in the Multi-Party Setting -- Software Mitigation of RISC-V Spectre Attacks -- A Modern Malware-oriented Dynamic Information Retrieval Tool -- M-Sel: A Message Selection Functional Encryption from Simple Tools -- Deniable Public-Key Authenticated Quantum Key Exchange -- Towards a secure and transparent blockchain-based system for e-commerce deliveries -- Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit -- OpenBSD formal driver verification with SeL4 -- An Efficient Small Modulus Test and Its Applications to Delegated Computation without Preprocessing -- Learning Homomorphisms with Rounding and Pseudorandom Function -- Some Results on Related Key-IV Pairs of Espresso. N2 - This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security. UR - http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-52947-4 ER -