03799nam 22007695 450 99646633070331620210804120426.03-030-20951-210.1007/978-3-030-20951-3(CKB)4100000008424386(DE-He213)978-3-030-20951-3(MiAaPQ)EBC5918980(PPN)254416527(EXLCZ)99410000000842438620190518d2019 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierCyber Security Cryptography and Machine Learning[electronic resource] Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings /edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.)Security and Cryptology ;115273-030-20950-4 Includes bibliographical references and index.This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.Security and Cryptology ;11527Computer securityComputer communication systemsComputer networksSecurity measuresData encryption (Computer science)ComputersLaw and legislationComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer security.Computer communication systems.Computer networksSecurity measures.Data encryption (Computer science).Computers.Law and legislation.Computers and civilization.Systems and Data Security.Computer Communication Networks.Mobile and Network Security.Cryptology.Legal Aspects of Computing.Computers and Society.005.8Dolev Shlomiedthttp://id.loc.gov/vocabulary/relators/edtHendler Dannyedthttp://id.loc.gov/vocabulary/relators/edtLodha Sachinedthttp://id.loc.gov/vocabulary/relators/edtYung Motiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466330703316Cyber Security Cryptography and Machine Learning2200042UNISA