Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings: Lecture Notes in Computer Science, cartea 12716
Editat de Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmannen Limba Engleză Paperback – 19 iun 2021
Din seria Lecture Notes in Computer Science
- 15%
Preț: 558.12 lei - 20%
Preț: 573.45 lei - 20%
Preț: 330.54 lei - 20%
Preț: 620.33 lei - 20%
Preț: 400.77 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 629.71 lei - 20%
Preț: 328.94 lei - 20%
Preț: 375.72 lei - 20%
Preț: 568.70 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 489.11 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 782.57 lei - 20%
Preț: 336.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 850.42 lei - 20%
Preț: 432.78 lei - 20%
Preț: 342.61 lei - 20%
Preț: 631.96 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 487.46 lei - 20%
Preț: 400.17 lei - 20%
Preț: 984.64 lei - 20%
Preț: 556.96 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 793.92 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 679.09 lei - 20%
Preț: 558.53 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 560.93 lei - 20%
Preț: 324.19 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 735.28 lei - 20%
Preț: 373.80 lei -
Preț: 395.25 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 330.36 lei
Preț vechi: 412.95 lei
-20%
Puncte Express: 496
Preț estimativ în valută:
58.40€ • 70.05$ • 50.77£
58.40€ • 70.05$ • 50.77£
Carte tipărită la comandă
Livrare economică 13-27 martie
Specificații
ISBN-13: 9783030780852
ISBN-10: 3030780856
Pagini: 506
Ilustrații: XIV, 506 p. 102 illus., 75 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.72 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030780856
Pagini: 506
Ilustrații: XIV, 506 p. 102 illus., 75 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.72 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks.- Adversaries Strike Hard: Adversarial Attacks against Malware Classifiers using Dynamic API Calls as Features.- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent.- Principal Component Analysis using CKKS Homomorphic Encryption Scheme.- DepthStAr: Deep Strange Arguments Detection.- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems.- Privacy Preserving Password Strength Meters with FHE.- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning.- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies.- Game of Drones - Detecting Spying Drones Using Time Domain Analysis.- Privacy Vulnerability of NeNDS Collaborative Filtering.- Lawful Interception in WebRTC Peer-To-Peer Communication.- Hierarchical Ring Signatures Immune to Randomness Injection Attacks.- Theoretical aspects of a priori on-line assessment of data predictability in applied tasks.- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement.- Warped Input Gaussian Processes for Time Series Forecasting.- History Binding Signature.- Effective enumeration of infinitely many programs that evade Formal Malware Analysis.- DNS-Morph: UDP-Based Bootstrapping Protocol For Tor.- Polynomial Time k-Shortest Multi-Criteria Prioritized and All-Criteria-Disjoint Paths.- Binding BIKE errors to a key pair.- Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform.- Efficient Secure Ridge Regression from Randomized Gaussian Elimination.- PolyDNN Polynomial Representation of NN for Communication-less SMPC Inference.- Use of Blockchain for ensuring Data Integrity in Cloud Databases.- The Coming AI Hackers.- Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for ScalableMPC.- Fully Dynamic Password Protected Secret Sharing: simplifying PPSS operation and maintenance.- Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features.- Software Integrity and Validation using Cryptographic Composability and Computer Vision.- Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup.- Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method.- Using a Neural Network to Detect Anomalies given an N-gram Profile.- Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations.- Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM.- Implementing GDPR in Social Networks using Trust and Context.