{"title":"An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors","authors":"E. Gudes, Nadav Voloch","doi":"10.1007/978-3-319-94147-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_5","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules","authors":"Oded Margalit","doi":"10.1007/978-3-319-94147-9_22","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_22","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117286845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Azran, Niv Ben Shabat, Tal Shkolnik, Yossef Oren
{"title":"Brief Announcement: Deriving Context for Touch Events","authors":"M. Azran, Niv Ben Shabat, Tal Shkolnik, Yossef Oren","doi":"10.1007/978-3-319-94147-9_23","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_23","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130731571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brief Announcement: Image Authentication Using Hyperspectral Layers","authors":"G. Leshem, M. Domb","doi":"10.1007/978-3-319-94147-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_14","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Building Active Defense Systems for Software Applications","authors":"Zara Perumal, K. Veeramachaneni","doi":"10.1007/978-3-319-94147-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_12","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124569644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks","authors":"I. Chatzigiannakis, V. Liagkou, P. Spirakis","doi":"10.1007/978-3-319-94147-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_8","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"346 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract)","authors":"Dor Bitan, S. Dolev","doi":"10.1007/978-3-319-94147-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_20","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious Attacks","authors":"S. Frenkel, V. Zakharov","doi":"10.1007/978-3-319-94147-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_15","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134042309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. O. Nunes, Karim M. El Defrawy, Tancrède Lepoint
{"title":"Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems","authors":"I. O. Nunes, Karim M. El Defrawy, Tancrède Lepoint","doi":"10.1007/978-3-319-94147-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_13","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Dolev, Chryssis Georgiou, Ioannis Marcoullis, E. Schiller
{"title":"Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors","authors":"S. Dolev, Chryssis Georgiou, Ioannis Marcoullis, E. Schiller","doi":"10.1007/978-3-319-94147-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_7","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114253382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}