001437902 000__ 06149cam\a2200709\i\4500 001437902 001__ 1437902 001437902 003__ OCoLC 001437902 005__ 20230309004238.0 001437902 006__ m\\\\\o\\d\\\\\\\\ 001437902 007__ cr\cn\nnnunnun 001437902 008__ 210707s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001437902 019__ $$a1266811980 001437902 020__ $$a9783030780869$$q(electronic bk.) 001437902 020__ $$a3030780864$$q(electronic bk.) 001437902 020__ $$z9783030780852$$q(print) 001437902 0247_ $$a10.1007/978-3-030-78086-9$$2doi 001437902 035__ $$aSP(OCoLC)1259363420 001437902 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dEBLCP$$dOCLCF$$dDCT$$dN$T$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001437902 049__ $$aISEA 001437902 050_4 $$aQA76.9.A25 001437902 08204 $$a005.8/24$$223 001437902 1112_ $$aCSCML (Symposium)$$n(5th :$$d2021 :$$cBeersheba, Israel) 001437902 24510 $$aCyber security cryptography and machine learning :$$b5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings /$$cShlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann (eds.). 001437902 2463_ $$aCSCML 2021 001437902 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2021] 001437902 300__ $$a1 online resource (xiv, 506 pages) :$$billustrations (some color) 001437902 336__ $$atext$$btxt$$2rdacontent 001437902 337__ $$acomputer$$bc$$2rdamedia 001437902 338__ $$aonline resource$$bcr$$2rdacarrier 001437902 347__ $$atext file 001437902 347__ $$bPDF 001437902 4901_ $$aLecture notes in computer science ;$$v12716 001437902 4901_ $$aLNCS sublibrary, SL 4, Security and cryptology 001437902 500__ $$aIncludes author index. 001437902 5050_ $$aProgrammable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- Adversaries Strike Hard: Adversarial Attacks against Malware Classifiers using Dynamic API Calls as Features -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- Principal Component Analysis using CKKS Homomorphic Encryption Scheme -- DepthStAr: Deep Strange Arguments Detection -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- Privacy Preserving Password Strength Meters with FHE -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- Game of Drones -- Detecting Spying Drones Using Time Domain Analysis -- Privacy Vulnerability of NeNDS Collaborative Filtering -- Lawful Interception in WebRTC Peer-To-Peer Communication -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- Theoretical aspects of a priori on-line assessment of data predictability in applied tasks -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- Warped Input Gaussian Processes for Time Series Forecasting -- History Binding Signature -- Effective enumeration of infinitely many programs that evade Formal Malware Analysis -- DNS-Morph: UDP-Based Bootstrapping Protocol For Tor -- Polynomial Time k-Shortest Multi-Criteria Prioritized and All-Criteria-Disjoint Paths -- Binding BIKE errors to a key pair -- Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform -- Efficient Secure Ridge Regression from Randomized Gaussian Elimination -- PolyDNN Polynomial Representation of NN for Communication-less SMPC Inference -- Use of Blockchain for ensuring Data Integrity in Cloud Databases -- The Coming AI Hackers -- Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC -- Fully Dynamic Password Protected Secret Sharing: simplifying PPSS operation and maintenance -- Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features -- Software Integrity and Validation using Cryptographic Composability and Computer Vision -- Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup -- Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method -- Using a Neural Network to Detect Anomalies given an N-gram Profile -- Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations -- Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM -- Implementing GDPR in Social Networks using Trust and Context. 001437902 506__ $$aAccess limited to authorized users. 001437902 520__ $$aThis book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021. The 22 full and 13 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 48 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. 001437902 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 7, 2021). 001437902 650_0 $$aData encryption (Computer science)$$vCongresses. 001437902 650_0 $$aInternet$$xSecurity measures$$vCongresses. 001437902 650_0 $$aMachine learning$$vCongresses. 001437902 650_6 $$aChiffrement (Informatique)$$vCongrès. 001437902 650_6 $$aInternet$$xSécurité$$xMesures$$vCongrès. 001437902 650_6 $$aApprentissage automatique$$vCongrès. 001437902 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001437902 655_7 $$aConference papers and proceedings.$$2lcgft 001437902 655_7 $$aActes de congrès.$$2rvmgf 001437902 655_0 $$aElectronic books. 001437902 7001_ $$aDolev, Shlomi,$$eeditor. 001437902 7001_ $$aMargalit, Oded,$$eeditor. 001437902 7001_ $$aPinkas, Benny,$$eeditor. 001437902 7001_ $$aSchwarzmann, Alexander A.,$$eeditor. 001437902 77608 $$iPrint version:$$z9783030780852 001437902 77608 $$iPrint version:$$z9783030780876 001437902 830_0 $$aLecture notes in computer science ;$$v12716. 001437902 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001437902 852__ $$bebk 001437902 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-78086-9$$zOnline Access$$91397441.1 001437902 909CO $$ooai:library.usi.edu:1437902$$pGLOBAL_SET 001437902 980__ $$aBIB 001437902 980__ $$aEBOOK 001437902 982__ $$aEbook 001437902 983__ $$aOnline 001437902 994__ $$a92$$bISE