International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services 零知识救援:关键金融服务生成密钥的一致冗余备份
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_2
M. Yung, C. Paya, Daniel James
{"title":"Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services","authors":"M. Yung, C. Paya, Daniel James","doi":"10.1007/978-3-030-49785-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_2","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131896038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient CORDIC-Based Sine and Cosine Implementation for a Dataflow Architecture - (Extended Abstract) 基于cordic的高效正弦余弦数据流架构实现——(扩展摘要)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_9
D. Khankin, Elad Raz, Ilan Tayari
{"title":"Efficient CORDIC-Based Sine and Cosine Implementation for a Dataflow Architecture - (Extended Abstract)","authors":"D. Khankin, Elad Raz, Ilan Tayari","doi":"10.1007/978-3-030-49785-9_9","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_9","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis NeuroGIFT:使用基于机器学习的Sat求解器进行密码分析
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_5
Ling Sun, David Gérault, Adrien Benamira, Thomas Peyrin
{"title":"NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis","authors":"Ling Sun, David Gérault, Adrien Benamira, Thomas Peyrin","doi":"10.1007/978-3-030-49785-9_5","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_5","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127583541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Can the Operator of a Drone Be Located by Following the Drone's Path? 可以通过跟踪无人机的路径来定位无人机的操作人员吗?
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_6
Eliyahu Mashhadi, Yossef Oren, Gera Weiss
{"title":"Can the Operator of a Drone Be Located by Following the Drone's Path?","authors":"Eliyahu Mashhadi, Yossef Oren, Gera Weiss","doi":"10.1007/978-3-030-49785-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_6","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116795448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureMCMR: Computation Outsourcing for MapReduce Applications SecureMCMR: MapReduce应用的计算外包
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_10
Lindsey Kennard, Ana L. Milanova
{"title":"SecureMCMR: Computation Outsourcing for MapReduce Applications","authors":"Lindsey Kennard, Ana L. Milanova","doi":"10.1007/978-3-030-49785-9_10","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_10","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128023469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64 精简圆形skin -64的单微调密码分析
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_1
O. Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle
{"title":"Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64","authors":"O. Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle","doi":"10.1007/978-3-030-49785-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_1","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125873493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning 利用监督学习检测以太坊区块链上的恶意账户
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_7
Nitesh Kumar, Ajay Singh, Anand Handa, S. Shukla
{"title":"Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning","authors":"Nitesh Kumar, Ajay Singh, Anand Handa, S. Shukla","doi":"10.1007/978-3-030-49785-9_7","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_7","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Average-Case Competitive Ratio of Scheduling Algorithms of Multi-user Cache 多用户缓存调度算法的平均竞争比
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_15
D. Berend, S. Dolev, A. Hassidim, Marina Kogan-Sadetsky
{"title":"Average-Case Competitive Ratio of Scheduling Algorithms of Multi-user Cache","authors":"D. Berend, S. Dolev, A. Hassidim, Marina Kogan-Sadetsky","doi":"10.1007/978-3-030-49785-9_15","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_15","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125962486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Ranking of IoT Devices Using an AHP Model 基于AHP模型的物联网设备安全排名
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_3
Shachar Siboni, Chanan Glezer, Rami Puzis, A. Shabtai, Y. Elovici
{"title":"Security Ranking of IoT Devices Using an AHP Model","authors":"Shachar Siboni, Chanan Glezer, Rami Puzis, A. Shabtai, Y. Elovici","doi":"10.1007/978-3-030-49785-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_3","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115252544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evasion Is Not Enough: A Case Study of Android Malware 逃避是不够的:Android恶意软件的案例研究
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_11
Harel Berger, Chen Hajaj, A. Dvir
{"title":"Evasion Is Not Enough: A Case Study of Android Malware","authors":"Harel Berger, Chen Hajaj, A. Dvir","doi":"10.1007/978-3-030-49785-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_11","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信