000 | 04383nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-030-49785-9 | ||
003 | DE-He213 | ||
005 | 20240730165749.0 | ||
007 | cr nn 008mamaa | ||
008 | 200603s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030497859 _9978-3-030-49785-9 |
||
024 | 7 |
_a10.1007/978-3-030-49785-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber Security Cryptography and Machine Learning _h[electronic resource] : _bFourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings / _cedited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXII, 255 p. 153 illus., 45 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12161 |
|
505 | 0 | _aSingle Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for DetectingMalicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. | |
520 | _aThis book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020. The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer systems. _990544 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _990545 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer System Implementation. _938514 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
700 | 1 |
_aDolev, Shlomi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _990546 |
|
700 | 1 |
_aKolesnikov, Vladimir. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _990547 |
|
700 | 1 |
_aLodha, Sachin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _990548 |
|
700 | 1 |
_aWeiss, Gera. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _990549 |
|
710 | 2 |
_aSpringerLink (Online service) _990550 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030497842 |
776 | 0 | 8 |
_iPrinted edition: _z9783030497866 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12161 _990551 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-49785-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86525 _d86525 |