default search action
4th CSCML 2020: Beer-Sheva, Israel
- Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss:
Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings. Lecture Notes in Computer Science 12161, Springer 2020, ISBN 978-3-030-49784-2 - Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. 1-17 - Moti Yung, Cem Paya, Daniel James:
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services. 18-28 - Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. 29-44 - Nitay Hason, Amit Dvir, Chen Hajaj:
Robust Malicious Domain Detection. 45-61 - Ling Sun, David Gérault, Adrien Benamira, Thomas Peyrin:
NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis. 62-84 - Eliyahu Mashhadi, Yossi Oren, Gera Weiss:
Can the Operator of a Drone Be Located by Following the Drone's Path? 85-93 - Nitesh Kumar, Ajay Singh, Anand Handa, Sandeep Kumar Shukla:
Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning. 94-109 - Nir Drucker, Shay Gueron, Dusan Kostic:
Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography. 110-127 - Daniel Khankin, Elad Raz, Ilan Tayari:
Efficient CORDIC-Based Sine and Cosine Implementation for a Dataflow Architecture - (Extended Abstract). 128-142 - Lindsey Kennard, Ana L. Milanova:
SecureMCMR: Computation Outsourcing for MapReduce Applications. 143-166 - Harel Berger, Chen Hajaj, Amit Dvir:
Evasion Is Not Enough: A Case Study of Android Malware. 167-174 - Shlomi Dolev, Matan Liber:
Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version). 175-192 - Imtiyazuddin Shaik, Ajeet Kumar Singh, Harika Narumanchi, Nitesh Emmadi, Rajan Mindigal Alasingara Bhattachar:
A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE. 193-218 - Eyal Paz, Ehud Gudes:
Comparison of DNS Based Methods for Detecting Malicious Domains. 219-236 - Daniel Berend, Shlomi Dolev, Avinatan Hassidim, Marina Kogan-Sadetsky:
Average-Case Competitive Ratio of Scheduling Algorithms of Multi-user Cache. 237-244 - Maya Bakshi, Mark Last:
CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption. 245-253
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.