000 05729nam a22006495i 4500
001 978-3-031-34671-2
003 DE-He213
005 20240730181156.0
007 cr nn 008mamaa
008 230531s2023 sz | s |||| 0|eng d
020 _a9783031346712
_9978-3-031-34671-2
024 7 _a10.1007/978-3-031-34671-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aCyber Security, Cryptology, and Machine Learning
_h[electronic resource] :
_b7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings /
_cedited by Shlomi Dolev, Ehud Gudes, Pascal Paillier.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXIV, 524 p. 132 illus., 100 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13914
505 0 _aLocalhost Detour from Public to Private Networks -- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation -- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic -- On Distributed Randomness Generation in Blockchains -- Efficient Skip Connections Realization for Secure Inference on Encrypted Data -- Single Instance Self-Masking via Permutations A Fusion-Based Framework for Unsupervised Single Image Super-Resolution -- Generating One-Hot Maps under Encryption Building blocks for LSTM homomorphic evaluation with TFHE -- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks -- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel -- A Bag of Tokens Neural Network to Predict Webpage Age -- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper) -- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image -- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO -- The use of Performance-Counters to perform side-channel attacks -- HAMLET: A Transformer Based Approach for Money Laundering Detection -- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks -- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic -- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs -- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks -- On adaptively secure prefix encryption under LWE SigML: Supervised Log Anomaly with Fully Homomorphic Encryption -- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue -- Improving Performance in Space-Hard Algorithms -- A survey of security challenges in Automatic Identification System (AIS) Protocol -- A new interpretation for the GHASH authenticator of AES-GCM -- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off -- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks -- Midgame Attacks and Defense Against Them -- Deep Neural Networks for Encrypted Inference with TFHE -- On the existence of highly organized communities in networks of locally interacting agents -- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages.
520 _aThis book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023, held in Be'er Sheva, Israel, in June 2023. The 21 full and 15 short papers were carefully reviewed and selected from 70 submissions. They deal with the theory, design, analysis, implementation, and application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
650 0 _aData protection.
_97245
650 0 _aApplication software.
_9123749
650 0 _aComputer networks .
_931572
650 0 _aMachine learning.
_91831
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer and Information Systems Applications.
_9123750
650 2 4 _aComputer Communication Networks.
_9123751
650 2 4 _aMachine Learning.
_91831
650 2 4 _aCryptology.
_931769
700 1 _aDolev, Shlomi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9123752
700 1 _aGudes, Ehud.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9123753
700 1 _aPaillier, Pascal.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9123754
710 2 _aSpringerLink (Online service)
_9123755
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031346705
776 0 8 _iPrinted edition:
_z9783031346729
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13914
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-34671-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90740
_d90740