Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (265 pages) : illustrations |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers Architecture, Computer Computer networks - Security measures Systems and Data Security Computer Communication Networks Cryptology Information Systems and Communication Service Computer System Implementation Mobile and Network Security |
ISBN | 3-030-49785-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. |
Record Nr. | UNISA-996418285703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (265 pages) : illustrations |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers Architecture, Computer Computer networks - Security measures Systems and Data Security Computer Communication Networks Cryptology Information Systems and Communication Service Computer System Implementation Mobile and Network Security |
ISBN | 3-030-49785-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. |
Record Nr. | UNINA-9910409661403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|