LEADER 03799nam 22007695 450 001 996466330703316 005 20210804120426.0 010 $a3-030-20951-2 024 7 $a10.1007/978-3-030-20951-3 035 $a(CKB)4100000008424386 035 $a(DE-He213)978-3-030-20951-3 035 $a(MiAaPQ)EBC5918980 035 $a(PPN)254416527 035 $a(EXLCZ)994100000008424386 100 $a20190518d2019 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Cryptography and Machine Learning$b[electronic resource] $eThird International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27?28, 2019, Proceedings /$fedited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11527 311 $a3-030-20950-4 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. 410 0$aSecurity and Cryptology ;$v11527 606 $aComputer security 606 $aComputer communication systems 606 $aComputer networks$xSecurity measures 606 $aData encryption (Computer science) 606 $aComputers 606 $aLaw and legislation 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aComputer networks$xSecurity measures. 615 0$aData encryption (Computer science). 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 676 $a005.8 702 $aDolev$b Shlomi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHendler$b Danny$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLodha$b Sachin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466330703316 996 $aCyber Security Cryptography and Machine Learning$92200042 997 $aUNISA