Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / [electronic resource] :
edited by Shlomi Dolev, Sachin Lodha.
- 1st ed. 2017.
- XII, 307 p. 59 illus. online resource.
- Security and Cryptology, 10332 2946-1863 ; .
- Security and Cryptology, 10332 .
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.
9783319600802
10.1007/978-3-319-60080-2 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Artificial intelligence.
Image processing--Digital techniques.
Computer vision.
Computer science--Mathematics.
Discrete mathematics.
Data and Information Security.
Cryptology.
Artificial Intelligence.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Discrete Mathematics in Computer Science.
QA76.9.A25
005.8
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.
9783319600802
10.1007/978-3-319-60080-2 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Artificial intelligence.
Image processing--Digital techniques.
Computer vision.
Computer science--Mathematics.
Discrete mathematics.
Data and Information Security.
Cryptology.
Artificial Intelligence.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Discrete Mathematics in Computer Science.
QA76.9.A25
005.8