Algorithmic Aspects of Wireless Sensor Networks [[electronic resource] ] : 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers / / edited by Shlomi Dolev |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XI, 263 p.) |
Disciplina | 004n/a |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer programming
Computer networks Algorithms Computer engineering Electronic digital computers—Evaluation Software engineering Programming Techniques Computer Communication Networks Computer Engineering and Networks System Performance and Evaluation Software Engineering |
ISBN | 3-642-05434-X |
Classificazione |
DAT 250f
DAT 530f ELT 745f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Invited Talk I Actuator Nets: Folding, Reconfiguring and Deploying Sensors -- Invited Talk II The Power and Limitations of Simple Algorithms: A Partial Case Study of Greedy Mechanisim Design for Combinatorial Actions -- Sensor Field: A Computational Model -- Near-Optimal Radio Use for Wireless Network Synchronization -- Approximating Barrier Resilience in Wireless Sensor Networks -- Improved Approximation Algorithms for Maximum Lifetime Problems in Wireless Networks -- On Active Attacks on Sensor Network Key Distribution Schemes -- Key Levels and Securing Key Predistribution against Node Captures -- Revisiting DoS Attacks and Privacy in RFID-Enabled Networks -- Link Reversal: How to Play Better to Work Less -- Early Obstacle Detection and Avoidance for All to All Traffic Pattern in Wireless Sensor Networks -- A Note on Uniform Power Connectivity in the SINR Model -- Locating a Black Hole without the Knowledge of Incoming Link -- Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices -- Brief Announcement: Universal Data Aggregation Trees for Sensor Networks in Low Doubling Metrics -- Brief Announcement on MOGRIBA: Multi-Objective Geographical Routing for Biomedical Applications of WSN -- Routing on Delay Tolerant Sensor Networks -- Better Face Routing Protocols -- Building a Communication Bridge with Mobile Hubs -- Compressing Kinetic Data from Sensor Networks -- Relocation Analysis of Stabilizing MAC Algorithms for Large-Scale Mobile Ad Hoc Networks -- Deterministic Collision Free Communication Despite Continuous Motion -- Self-stabilizing Deterministic Gathering -- Gossiping in Jail -- Complexity and Approximation of a Geometric Local Robot Assignment Problem. |
Record Nr. | UNISA-996465276803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithmic aspects of wireless sensor networks : 5th international workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009 ; revised selected papers / / Shlomi Dolev (ed.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer, 2009 |
Descrizione fisica | 1 online resource (XI, 263 p.) |
Disciplina | 004n/a |
Altri autori (Persone) | DolevShlomi |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer algorithms
Wireless LANs Wireless sensor networks |
ISBN | 3-642-05434-X |
Classificazione |
DAT 250f
DAT 530f ELT 745f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Invited Talk I Actuator Nets: Folding, Reconfiguring and Deploying Sensors -- Invited Talk II The Power and Limitations of Simple Algorithms: A Partial Case Study of Greedy Mechanisim Design for Combinatorial Actions -- Sensor Field: A Computational Model -- Near-Optimal Radio Use for Wireless Network Synchronization -- Approximating Barrier Resilience in Wireless Sensor Networks -- Improved Approximation Algorithms for Maximum Lifetime Problems in Wireless Networks -- On Active Attacks on Sensor Network Key Distribution Schemes -- Key Levels and Securing Key Predistribution against Node Captures -- Revisiting DoS Attacks and Privacy in RFID-Enabled Networks -- Link Reversal: How to Play Better to Work Less -- Early Obstacle Detection and Avoidance for All to All Traffic Pattern in Wireless Sensor Networks -- A Note on Uniform Power Connectivity in the SINR Model -- Locating a Black Hole without the Knowledge of Incoming Link -- Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices -- Brief Announcement: Universal Data Aggregation Trees for Sensor Networks in Low Doubling Metrics -- Brief Announcement on MOGRIBA: Multi-Objective Geographical Routing for Biomedical Applications of WSN -- Routing on Delay Tolerant Sensor Networks -- Better Face Routing Protocols -- Building a Communication Bridge with Mobile Hubs -- Compressing Kinetic Data from Sensor Networks -- Relocation Analysis of Stabilizing MAC Algorithms for Large-Scale Mobile Ad Hoc Networks -- Deterministic Collision Free Communication Despite Continuous Motion -- Self-stabilizing Deterministic Gathering -- Gossiping in Jail -- Complexity and Approximation of a Geometric Local Robot Assignment Problem. |
Altri titoli varianti | ALGOSENSORS 2009 |
Record Nr. | UNINA-9910484875803321 |
Berlin, : Springer, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security cryptography and machine learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, proceedings / / editors, Shlomi Dolev [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (520 pages) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science : security and cryptology |
Soggetto topico | Data encryption (Computer science) |
ISBN | 3-030-78086-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Torus and Torus Polynomials -- 2.2 Probability Distributions -- 3 Discretized TFHE -- 3.1 Encoding/Decoding Messages -- 3.2 Description -- 3.3 Leveled Operations -- 4 Programmable Bootstrapping -- 4.1 Blind Rotation -- 4.2 Look-Up Table Evaluation -- 5 Application to Neural Networks -- 5.1 Layers Without PBS -- 5.2 Layers with PBS -- 6 Experimental Results and Benchmarks -- 7 Conclusion -- A Complexity Assumptions Over the Real Torus -- B Algorithms -- B.1 Blind Rotation -- B.2 Sample Extraction -- B.3 Key Switching -- References -- Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features -- 1 Introduction -- 2 Problem Statement -- 3 Adversarial Learning Background -- 4 Related Work -- 5 Design and Implementation -- 5.1 Data Set Collection and Features Extraction -- 5.2 Target BlackBox Models -- 5.3 Malware Evasion Using GAN (MEGAN) and MEGAN with Reduced Perturbation (MEGAN-RP) -- 5.4 Malware Evasion Using Reinforcement Agents -- 6 Evaluation Results -- 7 Conclusion and Future Work -- References -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- 1 Introduction -- 1.1 Related Work -- 1.2 Outline -- 2 Hidden Set Intersection -- 3 Secure Gradient Descent -- 3.1 Regression -- 3.2 Classification -- 3.3 Gradient Descent Approach -- 3.4 MPyC -- 4 Performance -- 4.1 Run-Time -- 4.2 Accuracy -- 5 Conclusions and Future Work -- References -- Principal Component Analysis Using CKKS Homomorphic Scheme -- 1 Introduction -- 2 Preliminaries -- 2.1 CKKS Homomorphic Encryption Scheme -- 2.2 Principal Component Analysis (PCA) -- 2.3 Goldschmidt's Algorithm.
2.4 R2 Score -- 3 Vector Operations -- 3.1 Norm and Inversion by Norm -- 3.2 Ciphertext Packing -- 3.3 Vector Operations on Ciphertext and Sub-ciphertexts -- 4 Homomorphic Evaluations -- 4.1 Homomorhpic Goldschmidt's Algorithm -- 4.2 Homomorphic Power Method -- 4.3 Homomorphic PCA -- 5 Implementation Details and Results -- 5.1 Parameter Selection -- 5.2 Results -- 6 Conclusion and Future Work -- References -- DepthStAr: Deep Strange Arguments Detection -- 1 Introduction -- 2 Goals -- 3 Pattern Description -- 4 Methodology -- 4.1 A Formal Outline of the Algorithm -- 4.2 Suggested Workflow to Find Exploitable Security Weaknesses -- 5 Implementation -- 5.1 The angr Framework -- 5.2 Implementation Details -- 6 Evaluation -- 6.1 Rediscovery of Known Weaknesses in libcurl -- 6.2 Newly Detected Weaknesses -- 6.3 Synthetic Evaluation -- 7 A More General Take Away -- 8 Conclusion -- References -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- 1 Introduction -- 2 Threat Model -- 3 Proposed Methodology -- 3.1 Anomaly Detection Algorithm-Denoising Autoencoder (DAE) -- 3.2 Localization of the Attack Points -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Training Phase -- 4.3 Performance Evaluation Phase -- 4.4 Robustness in the Presence of Adversary During Training -- 5 Deployment of DAE in Real Time -- 6 Conclusion -- References -- Privacy-Preserving Password Strength Meters with FHE -- 1 Introduction -- 2 Fully Homomorphic Encryption -- 2.1 Privacy Preserving Search -- 2.2 Privacy Preserving Index Search -- 3 Privacy Preserving Password Strength Meters -- 3.1 Privacy Preserving Markov Model -- 3.2 Privacy Preserving PCFG Model -- 4 Conclusion and Future Work -- References -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- 1 Introduction -- 2 Proposed Approach -- 2.1 Dataset. 2.2 Proposed Method -- 3 Results -- 4 Conclusions -- References -- Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- 1 Introduction -- 1.1 Consensus, Money, and Contracts -- 1.2 Permissionless Consensus via PoW -- 1.3 Importance of Incentive-Compatibility -- 1.4 Drawbacks of Leader Election -- 1.5 Our Contributions -- 1.6 Related Works -- 2 Informal Protocol Overview -- 3 Meshcash Security -- 3.1 Security Proof Overview -- References -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- 1 Introduction -- 2 Background -- 2.1 Video Coding Algorithms -- 3 Related Work -- 4 Adversary Model and Proposed Detection Scheme -- 4.1 Detection Model -- 4.2 Detecting FPV Channels -- 5 Influence of Physical Stimulus -- 5.1 Lab Experiments -- 6 Evaluation -- 7 Conclusions and Future Work -- References -- Privacy Vulnerability of NeNDS Collaborative Filtering -- 1 Introduction -- 2 The NeNDS Algorithm -- 3 Privacy Attack on NeNDS -- 4 NeNDS Shortcomings -- 5 Conclusions -- References -- Lawful Interception in WebRTC Peer-To-Peer Communication -- 1 Introduction -- 2 Background and Related Work -- 2.1 Browsers' Support and Open Source WebRTC Libraries -- 2.2 ETSI Reference Model for Lawful Interception -- 2.3 Current Solutions for Intercepting VoIP Calls -- 3 WebRTC -- 3.1 Connection Initiation -- 3.2 Encryption -- 3.3 P2P Communication -- 3.4 Multi-party Conversations -- 4 The Interception Model -- 4.1 Signaling Services -- 4.2 Web Applications -- 5 Showcase -- 5.1 Signaling Services -- 5.2 Web Applications -- 5.3 LEA Management Console -- 6 Limitation of the Current Work -- 7 Conclusion -- References -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- 1 Introduction -- 2 Hierarchical Signature Scheme -- 2.1 Preliminaries and Notation. 2.2 Definition of Hierarchical-Signature Scheme -- 3 New Security Model -- 3.1 Anonymity Model -- 3.2 Strong Unforgeability Model -- 4 Modified Specific HRS Scheme -- 4.1 Unforgeability Analysis -- 4.2 Anonymity Analysis -- 5 Implementation -- 6 Conclusion -- References -- Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied Tasks -- 1 Introduction -- 2 Description and Problem Definitions -- 3 Metrics of Predictability: Related Work -- 3.1 Selection of a Predictor Based on the Model of Losses from Erroneous Predictions -- 4 Model and Procedure for Choosing a Predictor -- 5 "Ontological" Factors in Probabilistic Models of Prediction -- 6 Conclusion -- References -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- 1 Introduction -- 2 The Random Basis Encryption Scheme -- 3 Securing Entanglement -- 4 WM and the Random Basis CNOT QKD Scheme -- References -- Warped Input Gaussian Processes for Time Series Forecasting -- 1 Introduction -- 2 Preliminaries -- 3 Warped Input Gaussian Process Model -- 3.1 Model -- 3.2 Training -- 3.3 Forecasting -- 3.4 Modelling Seasonality -- 3.5 Time and Space Complexity -- 4 Empirical Evaluation -- 4.1 Synthetic Datasets -- 4.2 Real-World Datasets -- 5 Related Work -- 6 Conclusion -- References -- History Binding Signature -- 1 Introduction -- 2 Preliminaries -- 2.1 Verifiable Secret Sharing -- 2.2 Verifiable Secret Public Sharing -- 2.3 Verifiable Random Functions -- 3 History Binding Signature -- 4 Conditions for a Valid Signature -- 4.1 Unforgeability -- 4.2 Security -- 4.3 Correctness (Signing) -- 4.4 Correctness (Key-Revealing) -- 5 Conclusion and Future Work -- References -- Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis -- 1 Introduction -- 2 Foundations of Computation Theory. 3 Recursive Function Theory -- 4 Theoretical Impossibility of a Complete formal Malware/Non-malware Program Classification -- 5 Discussion and Directions for Further Research -- References -- DNS-Morph: UDP-Based Bootstrapping Protocol for Tor -- 1 Introduction -- 1.1 Our Contribution -- 2 Related Work -- 3 Threat Model -- 4 Obfsproxy Design -- 5 DNS-Morph Design -- 6 DNS-Morph Reliability -- 6.1 Received Packets Acknowledgments -- 6.2 Sorting Received Packets -- 6.3 DNS-Morph Identifiers' Encryption and Decryption -- 6.4 DNS-Morph Multiple Sessions Support -- 7 DNS-Morph Encoded Packets -- 8 DNS-Morph: Security Analysis -- 8.1 Censor's DPI Capabilities -- 8.2 DNS-Morph DPI Resistance -- 8.3 Additional Attacks and Resistance -- 8.4 Active Probing and Replay Attack Resistance -- 8.5 Domain Names' Entropy -- 9 DNS-Morph Design Considerations -- 9.1 Choice of DNS -- 9.2 Choice of Base32 -- 9.3 Query Types -- 9.4 Recursive DNS -- 10 Tests and Results -- 10.1 Test Setup -- 10.2 Client's Testing Environment -- 10.3 Deep Packet Inspection Tools -- 11 Summary -- 11.1 Future Works -- References -- Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths -- 1 Introduction and Related Work -- 2 Finding Prioritized Multi-criteria k-Shortest Paths in Polynomial Time -- 3 Prioritized Multi-criteria 2-Disjoint (Node/Edge) Shortest Paths -- 4 k-Disjoint All-Criteria-Shortest Paths -- References -- Binding BIKE Errors to a Key Pair -- 1 Introduction -- 2 Specific Proposals for BIKE -- 3 Practical Considerations and the BIKE Additional Implementation Package -- 4 Conclusion -- References -- Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier Transform -- 1 Introduction -- 2 Preliminaries -- 3 Efficient Negacyclic Convolution -- 3.1 Redundant Approach -- 3.2 Non-redundant Approach -- 4 Analysis of Error Propagation. 4.1 Error Propagation Through FFT and FFNT. |
Record Nr. | UNINA-9910488705003321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security cryptography and machine learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, proceedings / / editors, Shlomi Dolev [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (520 pages) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science : security and cryptology |
Soggetto topico | Data encryption (Computer science) |
ISBN | 3-030-78086-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Torus and Torus Polynomials -- 2.2 Probability Distributions -- 3 Discretized TFHE -- 3.1 Encoding/Decoding Messages -- 3.2 Description -- 3.3 Leveled Operations -- 4 Programmable Bootstrapping -- 4.1 Blind Rotation -- 4.2 Look-Up Table Evaluation -- 5 Application to Neural Networks -- 5.1 Layers Without PBS -- 5.2 Layers with PBS -- 6 Experimental Results and Benchmarks -- 7 Conclusion -- A Complexity Assumptions Over the Real Torus -- B Algorithms -- B.1 Blind Rotation -- B.2 Sample Extraction -- B.3 Key Switching -- References -- Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features -- 1 Introduction -- 2 Problem Statement -- 3 Adversarial Learning Background -- 4 Related Work -- 5 Design and Implementation -- 5.1 Data Set Collection and Features Extraction -- 5.2 Target BlackBox Models -- 5.3 Malware Evasion Using GAN (MEGAN) and MEGAN with Reduced Perturbation (MEGAN-RP) -- 5.4 Malware Evasion Using Reinforcement Agents -- 6 Evaluation Results -- 7 Conclusion and Future Work -- References -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- 1 Introduction -- 1.1 Related Work -- 1.2 Outline -- 2 Hidden Set Intersection -- 3 Secure Gradient Descent -- 3.1 Regression -- 3.2 Classification -- 3.3 Gradient Descent Approach -- 3.4 MPyC -- 4 Performance -- 4.1 Run-Time -- 4.2 Accuracy -- 5 Conclusions and Future Work -- References -- Principal Component Analysis Using CKKS Homomorphic Scheme -- 1 Introduction -- 2 Preliminaries -- 2.1 CKKS Homomorphic Encryption Scheme -- 2.2 Principal Component Analysis (PCA) -- 2.3 Goldschmidt's Algorithm.
2.4 R2 Score -- 3 Vector Operations -- 3.1 Norm and Inversion by Norm -- 3.2 Ciphertext Packing -- 3.3 Vector Operations on Ciphertext and Sub-ciphertexts -- 4 Homomorphic Evaluations -- 4.1 Homomorhpic Goldschmidt's Algorithm -- 4.2 Homomorphic Power Method -- 4.3 Homomorphic PCA -- 5 Implementation Details and Results -- 5.1 Parameter Selection -- 5.2 Results -- 6 Conclusion and Future Work -- References -- DepthStAr: Deep Strange Arguments Detection -- 1 Introduction -- 2 Goals -- 3 Pattern Description -- 4 Methodology -- 4.1 A Formal Outline of the Algorithm -- 4.2 Suggested Workflow to Find Exploitable Security Weaknesses -- 5 Implementation -- 5.1 The angr Framework -- 5.2 Implementation Details -- 6 Evaluation -- 6.1 Rediscovery of Known Weaknesses in libcurl -- 6.2 Newly Detected Weaknesses -- 6.3 Synthetic Evaluation -- 7 A More General Take Away -- 8 Conclusion -- References -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- 1 Introduction -- 2 Threat Model -- 3 Proposed Methodology -- 3.1 Anomaly Detection Algorithm-Denoising Autoencoder (DAE) -- 3.2 Localization of the Attack Points -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Training Phase -- 4.3 Performance Evaluation Phase -- 4.4 Robustness in the Presence of Adversary During Training -- 5 Deployment of DAE in Real Time -- 6 Conclusion -- References -- Privacy-Preserving Password Strength Meters with FHE -- 1 Introduction -- 2 Fully Homomorphic Encryption -- 2.1 Privacy Preserving Search -- 2.2 Privacy Preserving Index Search -- 3 Privacy Preserving Password Strength Meters -- 3.1 Privacy Preserving Markov Model -- 3.2 Privacy Preserving PCFG Model -- 4 Conclusion and Future Work -- References -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- 1 Introduction -- 2 Proposed Approach -- 2.1 Dataset. 2.2 Proposed Method -- 3 Results -- 4 Conclusions -- References -- Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- 1 Introduction -- 1.1 Consensus, Money, and Contracts -- 1.2 Permissionless Consensus via PoW -- 1.3 Importance of Incentive-Compatibility -- 1.4 Drawbacks of Leader Election -- 1.5 Our Contributions -- 1.6 Related Works -- 2 Informal Protocol Overview -- 3 Meshcash Security -- 3.1 Security Proof Overview -- References -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- 1 Introduction -- 2 Background -- 2.1 Video Coding Algorithms -- 3 Related Work -- 4 Adversary Model and Proposed Detection Scheme -- 4.1 Detection Model -- 4.2 Detecting FPV Channels -- 5 Influence of Physical Stimulus -- 5.1 Lab Experiments -- 6 Evaluation -- 7 Conclusions and Future Work -- References -- Privacy Vulnerability of NeNDS Collaborative Filtering -- 1 Introduction -- 2 The NeNDS Algorithm -- 3 Privacy Attack on NeNDS -- 4 NeNDS Shortcomings -- 5 Conclusions -- References -- Lawful Interception in WebRTC Peer-To-Peer Communication -- 1 Introduction -- 2 Background and Related Work -- 2.1 Browsers' Support and Open Source WebRTC Libraries -- 2.2 ETSI Reference Model for Lawful Interception -- 2.3 Current Solutions for Intercepting VoIP Calls -- 3 WebRTC -- 3.1 Connection Initiation -- 3.2 Encryption -- 3.3 P2P Communication -- 3.4 Multi-party Conversations -- 4 The Interception Model -- 4.1 Signaling Services -- 4.2 Web Applications -- 5 Showcase -- 5.1 Signaling Services -- 5.2 Web Applications -- 5.3 LEA Management Console -- 6 Limitation of the Current Work -- 7 Conclusion -- References -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- 1 Introduction -- 2 Hierarchical Signature Scheme -- 2.1 Preliminaries and Notation. 2.2 Definition of Hierarchical-Signature Scheme -- 3 New Security Model -- 3.1 Anonymity Model -- 3.2 Strong Unforgeability Model -- 4 Modified Specific HRS Scheme -- 4.1 Unforgeability Analysis -- 4.2 Anonymity Analysis -- 5 Implementation -- 6 Conclusion -- References -- Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied Tasks -- 1 Introduction -- 2 Description and Problem Definitions -- 3 Metrics of Predictability: Related Work -- 3.1 Selection of a Predictor Based on the Model of Losses from Erroneous Predictions -- 4 Model and Procedure for Choosing a Predictor -- 5 "Ontological" Factors in Probabilistic Models of Prediction -- 6 Conclusion -- References -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- 1 Introduction -- 2 The Random Basis Encryption Scheme -- 3 Securing Entanglement -- 4 WM and the Random Basis CNOT QKD Scheme -- References -- Warped Input Gaussian Processes for Time Series Forecasting -- 1 Introduction -- 2 Preliminaries -- 3 Warped Input Gaussian Process Model -- 3.1 Model -- 3.2 Training -- 3.3 Forecasting -- 3.4 Modelling Seasonality -- 3.5 Time and Space Complexity -- 4 Empirical Evaluation -- 4.1 Synthetic Datasets -- 4.2 Real-World Datasets -- 5 Related Work -- 6 Conclusion -- References -- History Binding Signature -- 1 Introduction -- 2 Preliminaries -- 2.1 Verifiable Secret Sharing -- 2.2 Verifiable Secret Public Sharing -- 2.3 Verifiable Random Functions -- 3 History Binding Signature -- 4 Conditions for a Valid Signature -- 4.1 Unforgeability -- 4.2 Security -- 4.3 Correctness (Signing) -- 4.4 Correctness (Key-Revealing) -- 5 Conclusion and Future Work -- References -- Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis -- 1 Introduction -- 2 Foundations of Computation Theory. 3 Recursive Function Theory -- 4 Theoretical Impossibility of a Complete formal Malware/Non-malware Program Classification -- 5 Discussion and Directions for Further Research -- References -- DNS-Morph: UDP-Based Bootstrapping Protocol for Tor -- 1 Introduction -- 1.1 Our Contribution -- 2 Related Work -- 3 Threat Model -- 4 Obfsproxy Design -- 5 DNS-Morph Design -- 6 DNS-Morph Reliability -- 6.1 Received Packets Acknowledgments -- 6.2 Sorting Received Packets -- 6.3 DNS-Morph Identifiers' Encryption and Decryption -- 6.4 DNS-Morph Multiple Sessions Support -- 7 DNS-Morph Encoded Packets -- 8 DNS-Morph: Security Analysis -- 8.1 Censor's DPI Capabilities -- 8.2 DNS-Morph DPI Resistance -- 8.3 Additional Attacks and Resistance -- 8.4 Active Probing and Replay Attack Resistance -- 8.5 Domain Names' Entropy -- 9 DNS-Morph Design Considerations -- 9.1 Choice of DNS -- 9.2 Choice of Base32 -- 9.3 Query Types -- 9.4 Recursive DNS -- 10 Tests and Results -- 10.1 Test Setup -- 10.2 Client's Testing Environment -- 10.3 Deep Packet Inspection Tools -- 11 Summary -- 11.1 Future Works -- References -- Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths -- 1 Introduction and Related Work -- 2 Finding Prioritized Multi-criteria k-Shortest Paths in Polynomial Time -- 3 Prioritized Multi-criteria 2-Disjoint (Node/Edge) Shortest Paths -- 4 k-Disjoint All-Criteria-Shortest Paths -- References -- Binding BIKE Errors to a Key Pair -- 1 Introduction -- 2 Specific Proposals for BIKE -- 3 Practical Considerations and the BIKE Additional Implementation Package -- 4 Conclusion -- References -- Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier Transform -- 1 Introduction -- 2 Preliminaries -- 3 Efficient Negacyclic Convolution -- 3.1 Redundant Approach -- 3.2 Non-redundant Approach -- 4 Analysis of Error Propagation. 4.1 Error Propagation Through FFT and FFNT. |
Record Nr. | UNISA-996464500103316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (265 pages) : illustrations |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers Architecture, Computer Computer networks - Security measures Systems and Data Security Computer Communication Networks Cryptology Information Systems and Communication Service Computer System Implementation Mobile and Network Security |
ISBN | 3-030-49785-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. |
Record Nr. | UNISA-996418285703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (265 pages) : illustrations |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers Architecture, Computer Computer networks - Security measures Systems and Data Security Computer Communication Networks Cryptology Information Systems and Communication Service Computer System Implementation Mobile and Network Security |
ISBN | 3-030-49785-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. |
Record Nr. | UNINA-9910409661403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Computers Law and legislation Computers and civilization Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Legal Aspects of Computing Computers and Society |
ISBN | 3-030-20951-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466330703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Computers Law and legislation Computers and civilization Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Legal Aspects of Computing Computers and Society |
ISBN | 3-030-20951-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910337850903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings / / edited by Itai Dinur, Shlomi Dolev, Sachin Lodha |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 287 p. 86 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Operating systems (Computers) Application software Data mining Computers and civilization Computer networks Data and Information Security Operating Systems Computer and Information Systems Applications Data Mining and Knowledge Discovery Computers and Society Computer Communication Networks |
ISBN | 3-319-94147-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events. |
Record Nr. | UNISA-996465692003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings / / edited by Itai Dinur, Shlomi Dolev, Sachin Lodha |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 287 p. 86 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Operating systems (Computers) Application software Data mining Computers and civilization Computer networks Data and Information Security Operating Systems Computer and Information Systems Applications Data Mining and Knowledge Discovery Computers and Society Computer Communication Networks |
ISBN | 3-319-94147-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events. |
Record Nr. | UNINA-9910349432303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|