| TÃtulo : |
5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Dolev, Shlomi, ; Margalit, Oded, ; Pinkas, Benny, ; Schwarzmann, Alexander, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XIV, 506 p. 102 ilustraciones, 75 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-78086-9 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Red de computadoras CriptografÃa Cifrado de datos (Informática) Red informática Seguridad de datos e información Redes de comunicación informática CriptologÃa Seguridad móvil y de red |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas del 5º Simposio Internacional sobre Ciberseguridad, CriptografÃa y Aprendizaje Automático, CSCML 2021, celebrado en Be''er Sheva, Israel, en julio de 2021. Los 22 artÃculos completos y 13 artÃculos breves presentados junto con un artÃculo de apertura en este volumen fueron cuidadosamente revisados ​​y seleccionados de 48 presentaciones. Abordan la teorÃa, el diseño, el análisis, la implementación o la aplicación de sistemas y redes de ciberseguridad, criptografÃa y aprendizaje automático, y temas conceptualmente innovadores en estas áreas de investigación. |
| Nota de contenido: |
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- Adversaries Strike Hard: Adversarial Attacks against Malware Classifiers using Dynamic API Calls as Features -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- Principal Component Analysis using CKKS Homomorphic Encryption Scheme -- DepthStAr: Deep Strange Arguments Detection -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- Privacy Preserving Password Strength Meters with FHE -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- Privacy Vulnerability of NeNDS Collaborative Filtering -- Lawful Interception in WebRTC Peer-To-Peer Communication -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- Theoretical aspects of a priori on-line assessment of data predictability in applied tasks -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- Warped Input Gaussian Processes for Time Series Forecasting -- History Binding Signature -- Effective enumeration of infinitely many programs that evade Formal Malware Analysis -- DNS-Morph: UDP-Based Bootstrapping Protocol For Tor -- Polynomial Time k-Shortest Multi-Criteria Prioritized and All-Criteria-Disjoint Paths -- Binding BIKE errors to a key pair -- Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform -- Efficient Secure Ridge Regression from Randomized Gaussian Elimination -- PolyDNN Polynomial Representation of NN for Communication-less SMPC Inference -- Use of Blockchain for ensuring Data Integrity in Cloud Databases -- The Coming AI Hackers -- Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for ScalableMPC -- Fully Dynamic Password Protected Secret Sharing: simplifying PPSS operation and maintenance -- Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features -- Software Integrity and Validation using Cryptographic Composability and Computer Vision -- Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup -- Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method -- Using a Neural Network to Detect Anomalies given an N-gram Profile -- Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations -- Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM -- Implementing GDPR in Social Networks using Trust and Context. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings [documento electrónico] / Dolev, Shlomi, ; Margalit, Oded, ; Pinkas, Benny, ; Schwarzmann, Alexander, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIV, 506 p. 102 ilustraciones, 75 ilustraciones en color. ISBN : 978-3-030-78086-9 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Red de computadoras CriptografÃa Cifrado de datos (Informática) Red informática Seguridad de datos e información Redes de comunicación informática CriptologÃa Seguridad móvil y de red |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas del 5º Simposio Internacional sobre Ciberseguridad, CriptografÃa y Aprendizaje Automático, CSCML 2021, celebrado en Be''er Sheva, Israel, en julio de 2021. Los 22 artÃculos completos y 13 artÃculos breves presentados junto con un artÃculo de apertura en este volumen fueron cuidadosamente revisados ​​y seleccionados de 48 presentaciones. Abordan la teorÃa, el diseño, el análisis, la implementación o la aplicación de sistemas y redes de ciberseguridad, criptografÃa y aprendizaje automático, y temas conceptualmente innovadores en estas áreas de investigación. |
| Nota de contenido: |
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- Adversaries Strike Hard: Adversarial Attacks against Malware Classifiers using Dynamic API Calls as Features -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- Principal Component Analysis using CKKS Homomorphic Encryption Scheme -- DepthStAr: Deep Strange Arguments Detection -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- Privacy Preserving Password Strength Meters with FHE -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- Privacy Vulnerability of NeNDS Collaborative Filtering -- Lawful Interception in WebRTC Peer-To-Peer Communication -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- Theoretical aspects of a priori on-line assessment of data predictability in applied tasks -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- Warped Input Gaussian Processes for Time Series Forecasting -- History Binding Signature -- Effective enumeration of infinitely many programs that evade Formal Malware Analysis -- DNS-Morph: UDP-Based Bootstrapping Protocol For Tor -- Polynomial Time k-Shortest Multi-Criteria Prioritized and All-Criteria-Disjoint Paths -- Binding BIKE errors to a key pair -- Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform -- Efficient Secure Ridge Regression from Randomized Gaussian Elimination -- PolyDNN Polynomial Representation of NN for Communication-less SMPC Inference -- Use of Blockchain for ensuring Data Integrity in Cloud Databases -- The Coming AI Hackers -- Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for ScalableMPC -- Fully Dynamic Password Protected Secret Sharing: simplifying PPSS operation and maintenance -- Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features -- Software Integrity and Validation using Cryptographic Composability and Computer Vision -- Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup -- Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method -- Using a Neural Network to Detect Anomalies given an N-gram Profile -- Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations -- Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM -- Implementing GDPR in Social Networks using Trust and Context. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |