


default search action
4th CSCML 2020: Beer-Sheva, Israel
- Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss:

Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings. Lecture Notes in Computer Science 12161, Springer 2020, ISBN 978-3-030-49784-2 - Orr Dunkelman

, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. 1-17 - Moti Yung, Cem Paya, Daniel James:

Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services. 18-28 - Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:

Security Ranking of IoT Devices Using an AHP Model. 29-44 - Nitay Hason, Amit Dvir

, Chen Hajaj
:
Robust Malicious Domain Detection. 45-61 - Ling Sun, David Gérault, Adrien Benamira, Thomas Peyrin

:
NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis. 62-84 - Eliyahu Mashhadi, Yossi Oren

, Gera Weiss:
Can the Operator of a Drone Be Located by Following the Drone's Path? 85-93 - Nitesh Kumar, Ajay Singh, Anand Handa, Sandeep Kumar Shukla:

Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning. 94-109 - Nir Drucker

, Shay Gueron
, Dusan Kostic
:
Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography. 110-127 - Daniel Khankin, Elad Raz, Ilan Tayari:

Efficient CORDIC-Based Sine and Cosine Implementation for a Dataflow Architecture - (Extended Abstract). 128-142 - Lindsey Kennard, Ana L. Milanova:

SecureMCMR: Computation Outsourcing for MapReduce Applications. 143-166 - Harel Berger

, Chen Hajaj
, Amit Dvir
:
Evasion Is Not Enough: A Case Study of Android Malware. 167-174 - Shlomi Dolev, Matan Liber:

Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version). 175-192 - Imtiyazuddin Shaik, Ajeet Kumar Singh, Harika Narumanchi, Nitesh Emmadi, Rajan Mindigal Alasingara Bhattachar:

A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE. 193-218 - Eyal Paz, Ehud Gudes:

Comparison of DNS Based Methods for Detecting Malicious Domains. 219-236 - Daniel Berend, Shlomi Dolev, Avinatan Hassidim, Marina Kogan-Sadetsky:

Average-Case Competitive Ratio of Scheduling Algorithms of Multi-user Cache. 237-244 - Maya Bakshi, Mark Last

:
CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption. 245-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














