top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Algorithmic Aspects of Wireless Sensor Networks [[electronic resource] ] : 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers / / edited by Shlomi Dolev
Algorithmic Aspects of Wireless Sensor Networks [[electronic resource] ] : 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers / / edited by Shlomi Dolev
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 263 p.)
Disciplina 004n/a
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer programming
Computer networks
Algorithms
Computer engineering
Electronic digital computers—Evaluation
Software engineering
Programming Techniques
Computer Communication Networks
Computer Engineering and Networks
System Performance and Evaluation
Software Engineering
ISBN 3-642-05434-X
Classificazione DAT 250f
DAT 530f
ELT 745f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Invited Talk I Actuator Nets: Folding, Reconfiguring and Deploying Sensors -- Invited Talk II The Power and Limitations of Simple Algorithms: A Partial Case Study of Greedy Mechanisim Design for Combinatorial Actions -- Sensor Field: A Computational Model -- Near-Optimal Radio Use for Wireless Network Synchronization -- Approximating Barrier Resilience in Wireless Sensor Networks -- Improved Approximation Algorithms for Maximum Lifetime Problems in Wireless Networks -- On Active Attacks on Sensor Network Key Distribution Schemes -- Key Levels and Securing Key Predistribution against Node Captures -- Revisiting DoS Attacks and Privacy in RFID-Enabled Networks -- Link Reversal: How to Play Better to Work Less -- Early Obstacle Detection and Avoidance for All to All Traffic Pattern in Wireless Sensor Networks -- A Note on Uniform Power Connectivity in the SINR Model -- Locating a Black Hole without the Knowledge of Incoming Link -- Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices -- Brief Announcement: Universal Data Aggregation Trees for Sensor Networks in Low Doubling Metrics -- Brief Announcement on MOGRIBA: Multi-Objective Geographical Routing for Biomedical Applications of WSN -- Routing on Delay Tolerant Sensor Networks -- Better Face Routing Protocols -- Building a Communication Bridge with Mobile Hubs -- Compressing Kinetic Data from Sensor Networks -- Relocation Analysis of Stabilizing MAC Algorithms for Large-Scale Mobile Ad Hoc Networks -- Deterministic Collision Free Communication Despite Continuous Motion -- Self-stabilizing Deterministic Gathering -- Gossiping in Jail -- Complexity and Approximation of a Geometric Local Robot Assignment Problem.
Record Nr. UNISA-996465276803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithmic Aspects of Wireless Sensor Networks [[electronic resource] ] : 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers / / edited by Shlomi Dolev
Algorithmic Aspects of Wireless Sensor Networks [[electronic resource] ] : 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers / / edited by Shlomi Dolev
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 263 p.)
Disciplina 004n/a
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer programming
Computer networks
Algorithms
Computer engineering
Electronic digital computers—Evaluation
Software engineering
Programming Techniques
Computer Communication Networks
Computer Engineering and Networks
System Performance and Evaluation
Software Engineering
ISBN 3-642-05434-X
Classificazione DAT 250f
DAT 530f
ELT 745f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Invited Talk I Actuator Nets: Folding, Reconfiguring and Deploying Sensors -- Invited Talk II The Power and Limitations of Simple Algorithms: A Partial Case Study of Greedy Mechanisim Design for Combinatorial Actions -- Sensor Field: A Computational Model -- Near-Optimal Radio Use for Wireless Network Synchronization -- Approximating Barrier Resilience in Wireless Sensor Networks -- Improved Approximation Algorithms for Maximum Lifetime Problems in Wireless Networks -- On Active Attacks on Sensor Network Key Distribution Schemes -- Key Levels and Securing Key Predistribution against Node Captures -- Revisiting DoS Attacks and Privacy in RFID-Enabled Networks -- Link Reversal: How to Play Better to Work Less -- Early Obstacle Detection and Avoidance for All to All Traffic Pattern in Wireless Sensor Networks -- A Note on Uniform Power Connectivity in the SINR Model -- Locating a Black Hole without the Knowledge of Incoming Link -- Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices -- Brief Announcement: Universal Data Aggregation Trees for Sensor Networks in Low Doubling Metrics -- Brief Announcement on MOGRIBA: Multi-Objective Geographical Routing for Biomedical Applications of WSN -- Routing on Delay Tolerant Sensor Networks -- Better Face Routing Protocols -- Building a Communication Bridge with Mobile Hubs -- Compressing Kinetic Data from Sensor Networks -- Relocation Analysis of Stabilizing MAC Algorithms for Large-Scale Mobile Ad Hoc Networks -- Deterministic Collision Free Communication Despite Continuous Motion -- Self-stabilizing Deterministic Gathering -- Gossiping in Jail -- Complexity and Approximation of a Geometric Local Robot Assignment Problem.
Record Nr. UNINA-9910484875803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security cryptography and machine learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, proceedings / / editors, Shlomi Dolev [and three others]
Cyber security cryptography and machine learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, proceedings / / editors, Shlomi Dolev [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (520 pages)
Disciplina 005.82
Collana Lecture notes in computer science : security and cryptology
Soggetto topico Data encryption (Computer science)
ISBN 3-030-78086-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Torus and Torus Polynomials -- 2.2 Probability Distributions -- 3 Discretized TFHE -- 3.1 Encoding/Decoding Messages -- 3.2 Description -- 3.3 Leveled Operations -- 4 Programmable Bootstrapping -- 4.1 Blind Rotation -- 4.2 Look-Up Table Evaluation -- 5 Application to Neural Networks -- 5.1 Layers Without PBS -- 5.2 Layers with PBS -- 6 Experimental Results and Benchmarks -- 7 Conclusion -- A Complexity Assumptions Over the Real Torus -- B Algorithms -- B.1 Blind Rotation -- B.2 Sample Extraction -- B.3 Key Switching -- References -- Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features -- 1 Introduction -- 2 Problem Statement -- 3 Adversarial Learning Background -- 4 Related Work -- 5 Design and Implementation -- 5.1 Data Set Collection and Features Extraction -- 5.2 Target BlackBox Models -- 5.3 Malware Evasion Using GAN (MEGAN) and MEGAN with Reduced Perturbation (MEGAN-RP) -- 5.4 Malware Evasion Using Reinforcement Agents -- 6 Evaluation Results -- 7 Conclusion and Future Work -- References -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- 1 Introduction -- 1.1 Related Work -- 1.2 Outline -- 2 Hidden Set Intersection -- 3 Secure Gradient Descent -- 3.1 Regression -- 3.2 Classification -- 3.3 Gradient Descent Approach -- 3.4 MPyC -- 4 Performance -- 4.1 Run-Time -- 4.2 Accuracy -- 5 Conclusions and Future Work -- References -- Principal Component Analysis Using CKKS Homomorphic Scheme -- 1 Introduction -- 2 Preliminaries -- 2.1 CKKS Homomorphic Encryption Scheme -- 2.2 Principal Component Analysis (PCA) -- 2.3 Goldschmidt's Algorithm.
2.4 R2 Score -- 3 Vector Operations -- 3.1 Norm and Inversion by Norm -- 3.2 Ciphertext Packing -- 3.3 Vector Operations on Ciphertext and Sub-ciphertexts -- 4 Homomorphic Evaluations -- 4.1 Homomorhpic Goldschmidt's Algorithm -- 4.2 Homomorphic Power Method -- 4.3 Homomorphic PCA -- 5 Implementation Details and Results -- 5.1 Parameter Selection -- 5.2 Results -- 6 Conclusion and Future Work -- References -- DepthStAr: Deep Strange Arguments Detection -- 1 Introduction -- 2 Goals -- 3 Pattern Description -- 4 Methodology -- 4.1 A Formal Outline of the Algorithm -- 4.2 Suggested Workflow to Find Exploitable Security Weaknesses -- 5 Implementation -- 5.1 The angr Framework -- 5.2 Implementation Details -- 6 Evaluation -- 6.1 Rediscovery of Known Weaknesses in libcurl -- 6.2 Newly Detected Weaknesses -- 6.3 Synthetic Evaluation -- 7 A More General Take Away -- 8 Conclusion -- References -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- 1 Introduction -- 2 Threat Model -- 3 Proposed Methodology -- 3.1 Anomaly Detection Algorithm-Denoising Autoencoder (DAE) -- 3.2 Localization of the Attack Points -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Training Phase -- 4.3 Performance Evaluation Phase -- 4.4 Robustness in the Presence of Adversary During Training -- 5 Deployment of DAE in Real Time -- 6 Conclusion -- References -- Privacy-Preserving Password Strength Meters with FHE -- 1 Introduction -- 2 Fully Homomorphic Encryption -- 2.1 Privacy Preserving Search -- 2.2 Privacy Preserving Index Search -- 3 Privacy Preserving Password Strength Meters -- 3.1 Privacy Preserving Markov Model -- 3.2 Privacy Preserving PCFG Model -- 4 Conclusion and Future Work -- References -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- 1 Introduction -- 2 Proposed Approach -- 2.1 Dataset.
2.2 Proposed Method -- 3 Results -- 4 Conclusions -- References -- Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- 1 Introduction -- 1.1 Consensus, Money, and Contracts -- 1.2 Permissionless Consensus via PoW -- 1.3 Importance of Incentive-Compatibility -- 1.4 Drawbacks of Leader Election -- 1.5 Our Contributions -- 1.6 Related Works -- 2 Informal Protocol Overview -- 3 Meshcash Security -- 3.1 Security Proof Overview -- References -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- 1 Introduction -- 2 Background -- 2.1 Video Coding Algorithms -- 3 Related Work -- 4 Adversary Model and Proposed Detection Scheme -- 4.1 Detection Model -- 4.2 Detecting FPV Channels -- 5 Influence of Physical Stimulus -- 5.1 Lab Experiments -- 6 Evaluation -- 7 Conclusions and Future Work -- References -- Privacy Vulnerability of NeNDS Collaborative Filtering -- 1 Introduction -- 2 The NeNDS Algorithm -- 3 Privacy Attack on NeNDS -- 4 NeNDS Shortcomings -- 5 Conclusions -- References -- Lawful Interception in WebRTC Peer-To-Peer Communication -- 1 Introduction -- 2 Background and Related Work -- 2.1 Browsers' Support and Open Source WebRTC Libraries -- 2.2 ETSI Reference Model for Lawful Interception -- 2.3 Current Solutions for Intercepting VoIP Calls -- 3 WebRTC -- 3.1 Connection Initiation -- 3.2 Encryption -- 3.3 P2P Communication -- 3.4 Multi-party Conversations -- 4 The Interception Model -- 4.1 Signaling Services -- 4.2 Web Applications -- 5 Showcase -- 5.1 Signaling Services -- 5.2 Web Applications -- 5.3 LEA Management Console -- 6 Limitation of the Current Work -- 7 Conclusion -- References -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- 1 Introduction -- 2 Hierarchical Signature Scheme -- 2.1 Preliminaries and Notation.
2.2 Definition of Hierarchical-Signature Scheme -- 3 New Security Model -- 3.1 Anonymity Model -- 3.2 Strong Unforgeability Model -- 4 Modified Specific HRS Scheme -- 4.1 Unforgeability Analysis -- 4.2 Anonymity Analysis -- 5 Implementation -- 6 Conclusion -- References -- Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied Tasks -- 1 Introduction -- 2 Description and Problem Definitions -- 3 Metrics of Predictability: Related Work -- 3.1 Selection of a Predictor Based on the Model of Losses from Erroneous Predictions -- 4 Model and Procedure for Choosing a Predictor -- 5 "Ontological" Factors in Probabilistic Models of Prediction -- 6 Conclusion -- References -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- 1 Introduction -- 2 The Random Basis Encryption Scheme -- 3 Securing Entanglement -- 4 WM and the Random Basis CNOT QKD Scheme -- References -- Warped Input Gaussian Processes for Time Series Forecasting -- 1 Introduction -- 2 Preliminaries -- 3 Warped Input Gaussian Process Model -- 3.1 Model -- 3.2 Training -- 3.3 Forecasting -- 3.4 Modelling Seasonality -- 3.5 Time and Space Complexity -- 4 Empirical Evaluation -- 4.1 Synthetic Datasets -- 4.2 Real-World Datasets -- 5 Related Work -- 6 Conclusion -- References -- History Binding Signature -- 1 Introduction -- 2 Preliminaries -- 2.1 Verifiable Secret Sharing -- 2.2 Verifiable Secret Public Sharing -- 2.3 Verifiable Random Functions -- 3 History Binding Signature -- 4 Conditions for a Valid Signature -- 4.1 Unforgeability -- 4.2 Security -- 4.3 Correctness (Signing) -- 4.4 Correctness (Key-Revealing) -- 5 Conclusion and Future Work -- References -- Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis -- 1 Introduction -- 2 Foundations of Computation Theory.
3 Recursive Function Theory -- 4 Theoretical Impossibility of a Complete formal Malware/Non-malware Program Classification -- 5 Discussion and Directions for Further Research -- References -- DNS-Morph: UDP-Based Bootstrapping Protocol for Tor -- 1 Introduction -- 1.1 Our Contribution -- 2 Related Work -- 3 Threat Model -- 4 Obfsproxy Design -- 5 DNS-Morph Design -- 6 DNS-Morph Reliability -- 6.1 Received Packets Acknowledgments -- 6.2 Sorting Received Packets -- 6.3 DNS-Morph Identifiers' Encryption and Decryption -- 6.4 DNS-Morph Multiple Sessions Support -- 7 DNS-Morph Encoded Packets -- 8 DNS-Morph: Security Analysis -- 8.1 Censor's DPI Capabilities -- 8.2 DNS-Morph DPI Resistance -- 8.3 Additional Attacks and Resistance -- 8.4 Active Probing and Replay Attack Resistance -- 8.5 Domain Names' Entropy -- 9 DNS-Morph Design Considerations -- 9.1 Choice of DNS -- 9.2 Choice of Base32 -- 9.3 Query Types -- 9.4 Recursive DNS -- 10 Tests and Results -- 10.1 Test Setup -- 10.2 Client's Testing Environment -- 10.3 Deep Packet Inspection Tools -- 11 Summary -- 11.1 Future Works -- References -- Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths -- 1 Introduction and Related Work -- 2 Finding Prioritized Multi-criteria k-Shortest Paths in Polynomial Time -- 3 Prioritized Multi-criteria 2-Disjoint (Node/Edge) Shortest Paths -- 4 k-Disjoint All-Criteria-Shortest Paths -- References -- Binding BIKE Errors to a Key Pair -- 1 Introduction -- 2 Specific Proposals for BIKE -- 3 Practical Considerations and the BIKE Additional Implementation Package -- 4 Conclusion -- References -- Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier Transform -- 1 Introduction -- 2 Preliminaries -- 3 Efficient Negacyclic Convolution -- 3.1 Redundant Approach -- 3.2 Non-redundant Approach -- 4 Analysis of Error Propagation.
4.1 Error Propagation Through FFT and FFNT.
Record Nr. UNINA-9910488705003321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security cryptography and machine learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, proceedings / / editors, Shlomi Dolev [and three others]
Cyber security cryptography and machine learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, proceedings / / editors, Shlomi Dolev [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (520 pages)
Disciplina 005.82
Collana Lecture notes in computer science : security and cryptology
Soggetto topico Data encryption (Computer science)
ISBN 3-030-78086-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Torus and Torus Polynomials -- 2.2 Probability Distributions -- 3 Discretized TFHE -- 3.1 Encoding/Decoding Messages -- 3.2 Description -- 3.3 Leveled Operations -- 4 Programmable Bootstrapping -- 4.1 Blind Rotation -- 4.2 Look-Up Table Evaluation -- 5 Application to Neural Networks -- 5.1 Layers Without PBS -- 5.2 Layers with PBS -- 6 Experimental Results and Benchmarks -- 7 Conclusion -- A Complexity Assumptions Over the Real Torus -- B Algorithms -- B.1 Blind Rotation -- B.2 Sample Extraction -- B.3 Key Switching -- References -- Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features -- 1 Introduction -- 2 Problem Statement -- 3 Adversarial Learning Background -- 4 Related Work -- 5 Design and Implementation -- 5.1 Data Set Collection and Features Extraction -- 5.2 Target BlackBox Models -- 5.3 Malware Evasion Using GAN (MEGAN) and MEGAN with Reduced Perturbation (MEGAN-RP) -- 5.4 Malware Evasion Using Reinforcement Agents -- 6 Evaluation Results -- 7 Conclusion and Future Work -- References -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- 1 Introduction -- 1.1 Related Work -- 1.2 Outline -- 2 Hidden Set Intersection -- 3 Secure Gradient Descent -- 3.1 Regression -- 3.2 Classification -- 3.3 Gradient Descent Approach -- 3.4 MPyC -- 4 Performance -- 4.1 Run-Time -- 4.2 Accuracy -- 5 Conclusions and Future Work -- References -- Principal Component Analysis Using CKKS Homomorphic Scheme -- 1 Introduction -- 2 Preliminaries -- 2.1 CKKS Homomorphic Encryption Scheme -- 2.2 Principal Component Analysis (PCA) -- 2.3 Goldschmidt's Algorithm.
2.4 R2 Score -- 3 Vector Operations -- 3.1 Norm and Inversion by Norm -- 3.2 Ciphertext Packing -- 3.3 Vector Operations on Ciphertext and Sub-ciphertexts -- 4 Homomorphic Evaluations -- 4.1 Homomorhpic Goldschmidt's Algorithm -- 4.2 Homomorphic Power Method -- 4.3 Homomorphic PCA -- 5 Implementation Details and Results -- 5.1 Parameter Selection -- 5.2 Results -- 6 Conclusion and Future Work -- References -- DepthStAr: Deep Strange Arguments Detection -- 1 Introduction -- 2 Goals -- 3 Pattern Description -- 4 Methodology -- 4.1 A Formal Outline of the Algorithm -- 4.2 Suggested Workflow to Find Exploitable Security Weaknesses -- 5 Implementation -- 5.1 The angr Framework -- 5.2 Implementation Details -- 6 Evaluation -- 6.1 Rediscovery of Known Weaknesses in libcurl -- 6.2 Newly Detected Weaknesses -- 6.3 Synthetic Evaluation -- 7 A More General Take Away -- 8 Conclusion -- References -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- 1 Introduction -- 2 Threat Model -- 3 Proposed Methodology -- 3.1 Anomaly Detection Algorithm-Denoising Autoencoder (DAE) -- 3.2 Localization of the Attack Points -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Training Phase -- 4.3 Performance Evaluation Phase -- 4.4 Robustness in the Presence of Adversary During Training -- 5 Deployment of DAE in Real Time -- 6 Conclusion -- References -- Privacy-Preserving Password Strength Meters with FHE -- 1 Introduction -- 2 Fully Homomorphic Encryption -- 2.1 Privacy Preserving Search -- 2.2 Privacy Preserving Index Search -- 3 Privacy Preserving Password Strength Meters -- 3.1 Privacy Preserving Markov Model -- 3.2 Privacy Preserving PCFG Model -- 4 Conclusion and Future Work -- References -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- 1 Introduction -- 2 Proposed Approach -- 2.1 Dataset.
2.2 Proposed Method -- 3 Results -- 4 Conclusions -- References -- Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- 1 Introduction -- 1.1 Consensus, Money, and Contracts -- 1.2 Permissionless Consensus via PoW -- 1.3 Importance of Incentive-Compatibility -- 1.4 Drawbacks of Leader Election -- 1.5 Our Contributions -- 1.6 Related Works -- 2 Informal Protocol Overview -- 3 Meshcash Security -- 3.1 Security Proof Overview -- References -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- 1 Introduction -- 2 Background -- 2.1 Video Coding Algorithms -- 3 Related Work -- 4 Adversary Model and Proposed Detection Scheme -- 4.1 Detection Model -- 4.2 Detecting FPV Channels -- 5 Influence of Physical Stimulus -- 5.1 Lab Experiments -- 6 Evaluation -- 7 Conclusions and Future Work -- References -- Privacy Vulnerability of NeNDS Collaborative Filtering -- 1 Introduction -- 2 The NeNDS Algorithm -- 3 Privacy Attack on NeNDS -- 4 NeNDS Shortcomings -- 5 Conclusions -- References -- Lawful Interception in WebRTC Peer-To-Peer Communication -- 1 Introduction -- 2 Background and Related Work -- 2.1 Browsers' Support and Open Source WebRTC Libraries -- 2.2 ETSI Reference Model for Lawful Interception -- 2.3 Current Solutions for Intercepting VoIP Calls -- 3 WebRTC -- 3.1 Connection Initiation -- 3.2 Encryption -- 3.3 P2P Communication -- 3.4 Multi-party Conversations -- 4 The Interception Model -- 4.1 Signaling Services -- 4.2 Web Applications -- 5 Showcase -- 5.1 Signaling Services -- 5.2 Web Applications -- 5.3 LEA Management Console -- 6 Limitation of the Current Work -- 7 Conclusion -- References -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- 1 Introduction -- 2 Hierarchical Signature Scheme -- 2.1 Preliminaries and Notation.
2.2 Definition of Hierarchical-Signature Scheme -- 3 New Security Model -- 3.1 Anonymity Model -- 3.2 Strong Unforgeability Model -- 4 Modified Specific HRS Scheme -- 4.1 Unforgeability Analysis -- 4.2 Anonymity Analysis -- 5 Implementation -- 6 Conclusion -- References -- Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied Tasks -- 1 Introduction -- 2 Description and Problem Definitions -- 3 Metrics of Predictability: Related Work -- 3.1 Selection of a Predictor Based on the Model of Losses from Erroneous Predictions -- 4 Model and Procedure for Choosing a Predictor -- 5 "Ontological" Factors in Probabilistic Models of Prediction -- 6 Conclusion -- References -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- 1 Introduction -- 2 The Random Basis Encryption Scheme -- 3 Securing Entanglement -- 4 WM and the Random Basis CNOT QKD Scheme -- References -- Warped Input Gaussian Processes for Time Series Forecasting -- 1 Introduction -- 2 Preliminaries -- 3 Warped Input Gaussian Process Model -- 3.1 Model -- 3.2 Training -- 3.3 Forecasting -- 3.4 Modelling Seasonality -- 3.5 Time and Space Complexity -- 4 Empirical Evaluation -- 4.1 Synthetic Datasets -- 4.2 Real-World Datasets -- 5 Related Work -- 6 Conclusion -- References -- History Binding Signature -- 1 Introduction -- 2 Preliminaries -- 2.1 Verifiable Secret Sharing -- 2.2 Verifiable Secret Public Sharing -- 2.3 Verifiable Random Functions -- 3 History Binding Signature -- 4 Conditions for a Valid Signature -- 4.1 Unforgeability -- 4.2 Security -- 4.3 Correctness (Signing) -- 4.4 Correctness (Key-Revealing) -- 5 Conclusion and Future Work -- References -- Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis -- 1 Introduction -- 2 Foundations of Computation Theory.
3 Recursive Function Theory -- 4 Theoretical Impossibility of a Complete formal Malware/Non-malware Program Classification -- 5 Discussion and Directions for Further Research -- References -- DNS-Morph: UDP-Based Bootstrapping Protocol for Tor -- 1 Introduction -- 1.1 Our Contribution -- 2 Related Work -- 3 Threat Model -- 4 Obfsproxy Design -- 5 DNS-Morph Design -- 6 DNS-Morph Reliability -- 6.1 Received Packets Acknowledgments -- 6.2 Sorting Received Packets -- 6.3 DNS-Morph Identifiers' Encryption and Decryption -- 6.4 DNS-Morph Multiple Sessions Support -- 7 DNS-Morph Encoded Packets -- 8 DNS-Morph: Security Analysis -- 8.1 Censor's DPI Capabilities -- 8.2 DNS-Morph DPI Resistance -- 8.3 Additional Attacks and Resistance -- 8.4 Active Probing and Replay Attack Resistance -- 8.5 Domain Names' Entropy -- 9 DNS-Morph Design Considerations -- 9.1 Choice of DNS -- 9.2 Choice of Base32 -- 9.3 Query Types -- 9.4 Recursive DNS -- 10 Tests and Results -- 10.1 Test Setup -- 10.2 Client's Testing Environment -- 10.3 Deep Packet Inspection Tools -- 11 Summary -- 11.1 Future Works -- References -- Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths -- 1 Introduction and Related Work -- 2 Finding Prioritized Multi-criteria k-Shortest Paths in Polynomial Time -- 3 Prioritized Multi-criteria 2-Disjoint (Node/Edge) Shortest Paths -- 4 k-Disjoint All-Criteria-Shortest Paths -- References -- Binding BIKE Errors to a Key Pair -- 1 Introduction -- 2 Specific Proposals for BIKE -- 3 Practical Considerations and the BIKE Additional Implementation Package -- 4 Conclusion -- References -- Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier Transform -- 1 Introduction -- 2 Preliminaries -- 3 Efficient Negacyclic Convolution -- 3.1 Redundant Approach -- 3.2 Non-redundant Approach -- 4 Analysis of Error Propagation.
4.1 Error Propagation Through FFT and FFNT.
Record Nr. UNISA-996464500103316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (265 pages) : illustrations
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers
Architecture, Computer
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Cryptology
Information Systems and Communication Service
Computer System Implementation
Mobile and Network Security
ISBN 3-030-49785-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption.
Record Nr. UNISA-996418285703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (265 pages) : illustrations
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers
Architecture, Computer
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Cryptology
Information Systems and Communication Service
Computer System Implementation
Mobile and Network Security
ISBN 3-030-49785-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption.
Record Nr. UNINA-9910409661403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computer networks - Security measures
Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Computer Communication Networks
Mobile and Network Security
Cryptology
Legal Aspects of Computing
Computers and Society
ISBN 3-030-20951-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466330703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Cyber Security Cryptography and Machine Learning : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computer networks - Security measures
Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Computer Communication Networks
Mobile and Network Security
Cryptology
Legal Aspects of Computing
Computers and Society
ISBN 3-030-20951-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910337850903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings / / edited by Itai Dinur, Shlomi Dolev, Sachin Lodha
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings / / edited by Itai Dinur, Shlomi Dolev, Sachin Lodha
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 287 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Operating systems (Computers)
Application software
Data mining
Computers and civilization
Computer networks
Data and Information Security
Operating Systems
Computer and Information Systems Applications
Data Mining and Knowledge Discovery
Computers and Society
Computer Communication Networks
ISBN 3-319-94147-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events.
Record Nr. UNISA-996465692003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings / / edited by Itai Dinur, Shlomi Dolev, Sachin Lodha
Cyber Security Cryptography and Machine Learning : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings / / edited by Itai Dinur, Shlomi Dolev, Sachin Lodha
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 287 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Operating systems (Computers)
Application software
Data mining
Computers and civilization
Computer networks
Data and Information Security
Operating Systems
Computer and Information Systems Applications
Data Mining and Knowledge Discovery
Computers and Society
Computer Communication Networks
ISBN 3-319-94147-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events.
Record Nr. UNINA-9910349432303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui