000 04383nam a22006615i 4500
001 978-3-030-49785-9
003 DE-He213
005 20240730165749.0
007 cr nn 008mamaa
008 200603s2020 sz | s |||| 0|eng d
020 _a9783030497859
_9978-3-030-49785-9
024 7 _a10.1007/978-3-030-49785-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aCyber Security Cryptography and Machine Learning
_h[electronic resource] :
_bFourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings /
_cedited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXII, 255 p. 153 illus., 45 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v12161
505 0 _aSingle Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for DetectingMalicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption.
520 _aThis book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020. The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer systems.
_990544
650 0 _aComputer networks
_xSecurity measures.
_93969
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_990545
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer System Implementation.
_938514
650 2 4 _aMobile and Network Security.
_933624
700 1 _aDolev, Shlomi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_990546
700 1 _aKolesnikov, Vladimir.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_990547
700 1 _aLodha, Sachin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_990548
700 1 _aWeiss, Gera.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_990549
710 2 _aSpringerLink (Online service)
_990550
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030497842
776 0 8 _iPrinted edition:
_z9783030497866
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v12161
_990551
856 4 0 _uhttps://doi.org/10.1007/978-3-030-49785-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c86525
_d86525