找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber Security Cryptography and Machine Learning; First International Shlomi Dolev,Sachin Lodha Conference proceedings 2017 Springer Inter

[复制链接]
查看: 19605|回复: 66
发表于 2025-3-21 18:09:47 | 显示全部楼层 |阅读模式
书目名称Cyber Security Cryptography and Machine Learning
副标题First International
编辑Shlomi Dolev,Sachin Lodha
视频video
概述Includes supplementary material:
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Cyber Security Cryptography and Machine Learning; First International  Shlomi Dolev,Sachin Lodha Conference proceedings 2017 Springer Inter
描述.This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017..The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction;  secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS..
出版日期Conference proceedings 2017
关键词algorithms; authentication; classification; computer crime; computer operating systems; computer programm
版次1
doihttps://doi.org/10.1007/978-3-319-60080-2
isbn_softcover978-3-319-60079-6
isbn_ebook978-3-319-60080-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer International Publishing AG 2017
The information of publication is updating

书目名称Cyber Security Cryptography and Machine Learning影响因子(影响力)




书目名称Cyber Security Cryptography and Machine Learning影响因子(影响力)学科排名




书目名称Cyber Security Cryptography and Machine Learning网络公开度




书目名称Cyber Security Cryptography and Machine Learning网络公开度学科排名




书目名称Cyber Security Cryptography and Machine Learning被引频次




书目名称Cyber Security Cryptography and Machine Learning被引频次学科排名




书目名称Cyber Security Cryptography and Machine Learning年度引用




书目名称Cyber Security Cryptography and Machine Learning年度引用学科排名




书目名称Cyber Security Cryptography and Machine Learning读者反馈




书目名称Cyber Security Cryptography and Machine Learning读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:38:47 | 显示全部楼层
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage,We present a version of Camenisch-Lysyanskaya’s anonymous credential system immune to attacks based on leakage of ephemeral values used during protocol execution. While preserving “provable security” of the original design, our scheme improves its security in a realistic scenario of an imperfect implementation on a cryptographic device.
发表于 2025-3-22 04:09:50 | 显示全部楼层
发表于 2025-3-22 05:26:34 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/241746.jpg
发表于 2025-3-22 10:56:46 | 显示全部楼层
Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Fa malicious attacks, and can distort values of variables, operations, the codes, etc., is solved by applying the widely used Fault Injection (FI) simulation technique. Main drawback of the FI is necessity to have different expensive software that can not be used to solve other design problems, in particular verification and testing.
发表于 2025-3-22 13:50:26 | 显示全部楼层
Varieties of Abnormal Behavioursed for deriving cryptographic keys from biometric data. FEs rely in their operation on a public “helper string” that is guaranteed not to leak too much information about the original input. Unfortunately, this guarantee may not hold when . independent helper strings are generated from correlated in
发表于 2025-3-22 19:54:13 | 显示全部楼层
发表于 2025-3-22 23:02:44 | 显示全部楼层
发表于 2025-3-23 03:09:11 | 显示全部楼层
https://doi.org/10.1007/978-1-349-16831-6ymous while server processes maintaining the state of the register may be compromised by rational adversaries (i.e., a server might behave as . process). We first model our problem as a Bayesian game between a client and a rational malicious server where the equilibrium depends on the decisions of t
发表于 2025-3-23 07:36:35 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-27 22:43
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表