LEADER 04933nam 22007455 450 001 996418285703316 005 20210805144353.0 010 $a3-030-49785-2 024 7 $a10.1007/978-3-030-49785-9 035 $a(CKB)4100000011325576 035 $a(MiAaPQ)EBC6298455 035 $a(DE-He213)978-3-030-49785-9 035 $a(PPN)248595180 035 $a(EXLCZ)994100000011325576 100 $a20200603d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Cryptography and Machine Learning$b[electronic resource] $eFourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2?3, 2020, Proceedings /$fedited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (265 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v12161 311 $a3-030-49784-4 327 $aSingle Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. 330 $aThis book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Beer-Sheva, Israel, in July 2020. The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. 410 0$aSecurity and Cryptology ;$v12161 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aComputers 606 $aArchitecture, Computer 606 $aComputer networks$xSecurity measures 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aComputers. 615 0$aArchitecture, Computer. 615 0$aComputer networks$xSecurity measures. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aInformation Systems and Communication Service. 615 24$aComputer System Implementation. 615 24$aMobile and Network Security. 676 $a005.824 702 $aDolev$b Shlomi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKolesnikov$b Vladimir$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLodha$b Sachin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWeiss$b Gera$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418285703316 996 $aCyber Security Cryptography and Machine Learning$92200042 997 $aUNISA LEADER 01920oam 22005654a 450 001 9910792345403321 005 20230721015912.0 010 $a1-282-44580-4 010 $a9786612445804 010 $a0-299-22913-0 035 $a(CKB)2670000000016013 035 $a(OCoLC)550365539 035 $a(CaPaEBR)ebrary10386267 035 $a(SSID)ssj0000343156 035 $a(PQKBManifestationID)11280692 035 $a(PQKBTitleCode)TC0000343156 035 $a(PQKBWorkID)10289884 035 $a(PQKB)10624071 035 $a(MdBmJHUP)muse12018 035 $a(MiAaPQ)EBC3444995 035 $a(EXLCZ)992670000000016013 100 $a20080328d2008 uy 0 101 0 $aeng 135 $aur|||||||nn|n 181 $ctxt 182 $cc 183 $acr 200 10$aSpirit, Structure, and Flesh$b[electronic resource] $eGender and Power in Yoruba African Instituted Churches /$fDeidre Helen Crumbley 210 $aMadison, Wis. $cUniversity of Wisconsin Press$dc2008 215 $a1 online resource (198 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-299-22914-9 320 $aIncludes bibliographical references (p. 155-167) and index. 606 $aYoruba (African people)$xRites and ceremonies 606 $aWomen in Christianity$zNigeria 606 $aSex role$xReligious aspects$xChristianity 606 $aAfrican-instituted churches 607 $aNigeria$xReligious life and customs 615 0$aYoruba (African people)$xRites and ceremonies. 615 0$aWomen in Christianity 615 0$aSex role$xReligious aspects$xChristianity. 615 0$aAfrican-instituted churches. 676 $a289.9/308209669 700 $aCrumbley$b Deidre Helen$f1947-$01485359 801 0$bMdBmJHUP 801 1$bMdBmJHUP 906 $aBOOK 912 $a9910792345403321 996 $aSpirit, Structure, and Flesh$93810070 997 $aUNINA