Cyber Security, Cryptology, and Machine Learning [[electronic resource] ] : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings / / edited by Shlomi Dolev, Ehud Gudes, Pascal Paillier |
Autore | Dolev Shlomi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (539 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
GudesEhud
PaillierPascal |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Application software Computer networks Machine learning Cryptography Data encryption (Computer science) Data and Information Security Computer and Information Systems Applications Computer Communication Networks Machine Learning Cryptology |
ISBN | 3-031-34671-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Localhost Detour from Public to Private Networks -- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation -- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic -- On Distributed Randomness Generation in Blockchains -- Efficient Skip Connections Realization for Secure Inference on Encrypted Data -- Single Instance Self-Masking via Permutations A Fusion-Based Framework for Unsupervised Single Image Super-Resolution -- Generating One-Hot Maps under Encryption Building blocks for LSTM homomorphic evaluation with TFHE -- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks -- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel -- A Bag of Tokens Neural Network to Predict Webpage Age -- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper) -- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image -- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO -- The use of Performance-Counters to perform side-channel attacks -- HAMLET: A Transformer Based Approach for Money Laundering Detection -- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks -- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic -- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs -- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks -- On adaptively secure prefix encryption under LWE SigML: Supervised Log Anomaly with Fully Homomorphic Encryption -- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue -- Improving Performance in Space-Hard Algorithms -- A survey of security challenges in Automatic Identification System (AIS) Protocol -- A new interpretation for the GHASH authenticator of AES-GCM -- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off -- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks -- Midgame Attacks and Defense Against Them -- Deep Neural Networks for Encrypted Inference with TFHE -- On the existence of highly organized communities in networks of locally interacting agents -- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages. |
Record Nr. | UNISA-996538666003316 |
Dolev Shlomi | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security, Cryptology, and Machine Learning : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings / / edited by Shlomi Dolev, Ehud Gudes, Pascal Paillier |
Autore | Dolev Shlomi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (539 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
GudesEhud
PaillierPascal |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Application software Computer networks Machine learning Cryptography Data encryption (Computer science) Data and Information Security Computer and Information Systems Applications Computer Communication Networks Machine Learning Cryptology |
ISBN | 3-031-34671-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Localhost Detour from Public to Private Networks -- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation -- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic -- On Distributed Randomness Generation in Blockchains -- Efficient Skip Connections Realization for Secure Inference on Encrypted Data -- Single Instance Self-Masking via Permutations A Fusion-Based Framework for Unsupervised Single Image Super-Resolution -- Generating One-Hot Maps under Encryption Building blocks for LSTM homomorphic evaluation with TFHE -- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks -- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel -- A Bag of Tokens Neural Network to Predict Webpage Age -- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper) -- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image -- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO -- The use of Performance-Counters to perform side-channel attacks -- HAMLET: A Transformer Based Approach for Money Laundering Detection -- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks -- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic -- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs -- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks -- On adaptively secure prefix encryption under LWE SigML: Supervised Log Anomaly with Fully Homomorphic Encryption -- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue -- Improving Performance in Space-Hard Algorithms -- A survey of security challenges in Automatic Identification System (AIS) Protocol -- A new interpretation for the GHASH authenticator of AES-GCM -- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off -- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks -- Midgame Attacks and Defense Against Them -- Deep Neural Networks for Encrypted Inference with TFHE -- On the existence of highly organized communities in networks of locally interacting agents -- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages. |
Record Nr. | UNINA-9910734855503321 |
Dolev Shlomi | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2009] |
Descrizione fisica | 1 online resource (324 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Database security
Computer networks - Security measures Computers - Access control |
ISBN |
1-282-29798-8
9786612297984 3-642-03007-6 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications. |
Record Nr. | UNINA-9910484176403321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2009] |
Descrizione fisica | 1 online resource (324 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Database security
Computer networks - Security measures Computers - Access control |
ISBN |
1-282-29798-8
9786612297984 3-642-03007-6 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications. |
Record Nr. | UNISA-996465625403316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust Management VIII [[electronic resource] ] : 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings / / edited by Jianying Zhou, Nurit Gal-Oz, Jie Zhang, Ehud Gudes |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 245 p. 65 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computers and civilization
Computer security Computers Computers and Society Systems and Data Security Information Systems and Communication Service |
ISBN | 3-662-43813-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Importance of Trust in Computer Security -- Trust MUSE: A Model-Driven Approach for Trust Management -- Reusability for Trust and Reputation Systems -- On Robustness of Trust Systems -- Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks -- Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks -- Anomaly Detection for Mobile Device Comfort -- Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records -- A Privacy Risk Model for Trajectory Data -- Providing Trustworthy Advice Online: An Exploratory Study on the Potential of Discursive Psychology in Trust Research -- Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative Behaviours -- A Calculus for Trust and Reputation Systems -- Knots Maintenance for Optimal Management of Trust Relations -- On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks -- Reputation-Based Cooperation in the Clouds -- Introducing Patient and Dentist Profiling and Crowdsourcing to Improve Trust in Dental Care Recommendation Systems -- Abstract Accountability Language -- Trust Assessment Using Cloud Broker. |
Record Nr. | UNINA-9910298972203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|