Linked to FindBook      Google Book      Amazon      博客來     
  • Cyber security, cryptology, and machine learning = 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30-July 1, 2022 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Cyber security, cryptology, and machine learning/ edited by Shlomi Dolev, Jonathan Katz, Amnon Meisels.
    Reminder of title: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30-July 1, 2022 : proceedings /
    remainder title: CSCML 2022
    other author: Dolev, Shlomi.
    corporate name: CSCML (Symposium)
    Published: Cham :Springer International Publishing : : 2022.,
    Description: xiv, 508 p. :ill. (chiefly color), digital ;24 cm.
    [NT 15003449]: Blind Rotation in Fully Homomorphic Encryption with Extended Keys -- Monitoring Time Series With Missing Values: a Deep Probabilistic Approach -- Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling -- Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio -- Simulating a Coupon Collector -- On the undecidability of the Panopticon detection problem -- Privacy-Preserving Contrastive Explanations with Local Foil Trees -- Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies -- Predicting the direction of changes in the values of time series for relatively small training samples -- Machine-Learning Based Objective Function Selection for Community Detection -- Randomness for Randomness Testing -- Botnet attack identification based on SDN -- Setting up an anonymous gesture database as well as enhancing it with a verbal script simulator for rehabilitation applications -- Fake News Detection in Social Networks using Machine Learning and Trust -- Reinforcement Based User Scheduling for Cellular Communications -- A Heuristic Framework to search for Approximate Mutually Unbiased Bases -- Counter Mode for Long Messages and a Long Nonce -- Transfer learning for time series classification using synthetic data generation -- Non-Stopping Junctions via Traffic Scheduling -- Predicting subscriber usage: Analyzing multidimensional time-series using Convolutional Neural Networks -- Smart Cybercrime Classification for Digital Forensics with Small Datasets -- Auditable, Available and Resilient Private Computation on the Blockchain via MPC -- Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting -- Mutual Accountability Layer: Accountable Anonymity within Accountable Trust -- Faster Post-Quantum TLS handshakes Without Intermediate CA Certificates -- Enhancing Cybersecurity of Satellites at sub-THz Bands -- Polynomial Approximation of Inverse sqrt Function for FHE -- Detecting Clickbait in Online Social Media: You Won't Believe How We Did It -- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum -- A Linear-Time 2-Party Secure Merge Protocol -- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms -- Differentially-Private ''Draw and Discard'' Machine Learning: Training Distributed Models from Enormous Crowds -- Privacy Preserving Solution of DCOPs by Mediation -- BFLUT Bloom Filter for Private Look Up Tables.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-07689-3
    ISBN: 9783031076893
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9463123 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C73 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login