FindBook      Google Book      Amazon      博客來     
  • Cyber security, cryptology, and machine learning = 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30-July 1, 2022 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Cyber security, cryptology, and machine learning/ edited by Shlomi Dolev, Jonathan Katz, Amnon Meisels.
    其他題名: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30-July 1, 2022 : proceedings /
    其他題名: CSCML 2022
    其他作者: Dolev, Shlomi.
    團體作者: CSCML (Symposium)
    出版者: Cham :Springer International Publishing : : 2022.,
    面頁冊數: xiv, 508 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Blind Rotation in Fully Homomorphic Encryption with Extended Keys -- Monitoring Time Series With Missing Values: a Deep Probabilistic Approach -- Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling -- Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio -- Simulating a Coupon Collector -- On the undecidability of the Panopticon detection problem -- Privacy-Preserving Contrastive Explanations with Local Foil Trees -- Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies -- Predicting the direction of changes in the values of time series for relatively small training samples -- Machine-Learning Based Objective Function Selection for Community Detection -- Randomness for Randomness Testing -- Botnet attack identification based on SDN -- Setting up an anonymous gesture database as well as enhancing it with a verbal script simulator for rehabilitation applications -- Fake News Detection in Social Networks using Machine Learning and Trust -- Reinforcement Based User Scheduling for Cellular Communications -- A Heuristic Framework to search for Approximate Mutually Unbiased Bases -- Counter Mode for Long Messages and a Long Nonce -- Transfer learning for time series classification using synthetic data generation -- Non-Stopping Junctions via Traffic Scheduling -- Predicting subscriber usage: Analyzing multidimensional time-series using Convolutional Neural Networks -- Smart Cybercrime Classification for Digital Forensics with Small Datasets -- Auditable, Available and Resilient Private Computation on the Blockchain via MPC -- Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting -- Mutual Accountability Layer: Accountable Anonymity within Accountable Trust -- Faster Post-Quantum TLS handshakes Without Intermediate CA Certificates -- Enhancing Cybersecurity of Satellites at sub-THz Bands -- Polynomial Approximation of Inverse sqrt Function for FHE -- Detecting Clickbait in Online Social Media: You Won't Believe How We Did It -- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum -- A Linear-Time 2-Party Secure Merge Protocol -- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms -- Differentially-Private ''Draw and Discard'' Machine Learning: Training Distributed Models from Enormous Crowds -- Privacy Preserving Solution of DCOPs by Mediation -- BFLUT Bloom Filter for Private Look Up Tables.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-07689-3
    ISBN: 9783031076893
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9463123 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C73 2022 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入