default search action
1st CSCML 2017: Beer-Sheva, Israel
- Shlomi Dolev, Sachin Lodha:
Cyber Security Cryptography and Machine Learning - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings. Lecture Notes in Computer Science 10332, Springer 2017, ISBN 978-3-319-60079-6 - Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz:
Efficient, Reusable Fuzzy Extractors from LWE. 1-18 - Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon:
GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. 19-33 - Tomer Cohen, Danny Hendler, Dennis Potashnik:
Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract). 34-49 - Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni:
Building Regular Registers with Rational Malicious Servers and Anonymous Clients. 50-67 - Francesco Aldà, Hans Ulrich Simon:
On the Optimality of the Exponential Mechanism. 68-85 - Hyang-Sook Lee, Seongan Lim, Ikkwon Yie:
On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups. 86-95 - Lukasz Krzywiecki, Marta Wszola, Miroslaw Kutylowski:
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. 96-98 - Adam L. Young, Moti Yung:
The Combinatorics of Product Scanning Multiplication and Squaring. 99-114 - Edwin Dauber, Rebekah Overdorf, Rachel Greenstadt:
Stylometric Authorship Attribution of Collaborative Documents. 115-135 - Filipp Valovich:
A Distributed Investment Encryption Scheme: Investcoin. 136-154 - Ziv Goldfeld, Paul W. Cuff, Haim H. Permuter:
Physical Layer Security over Wiretap Channels with Random Parameters. 155-170 - Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Assisting Malware Analysis with Symbolic Execution: A Case Study. 171-188 - Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma:
Brief Announcement: A Consent Management Solution for Enterprises. 189-192 - Nir Maoz, Ehud Gudes:
Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party. 193-195 - Sergey Frenkel, Victor N. Zakharov:
Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Faults and Attacks. 196-199 - Cody Freitag, Jonathan Katz, Nathan Klein:
Symmetric-Key Broadcast Encryption: The Multi-sender Case. 200-214 - Michele Carminati, Luca Valentini, Stefano Zanero:
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System. 215-233 - Tom Gonda, Rami Puzis, Bracha Shapira:
Scalable Attack Path Finding for Increased Security. 234-249 - Ignacio Arnaldo, Alfredo Cuesta-Infante, Ankit Arun, Mei Lam, Costas Bassias, Kalyan Veeramachaneni:
Learning Representations for Log Data in Cybersecurity. 250-268 - Hadar Polad, Rami Puzis, Bracha Shapira:
Attack Graph Obfuscation. 269-287 - Giuseppe Laurenza, Leonardo Aniello, Riccardo Lazzeretti, Roberto Baldoni:
Malware Triage Based on Static Features and Public APT Reports. 288-305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.