Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1348
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDolev, Shlomi. ;en_US
dc.contributor.authorLodha, Sachin. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:54Z-
dc.date.available2020-05-17T08:27:54Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319600802 ;en_US
dc.identifier.isbn9783319600796 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1348-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319600796. ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ;en_US
dc.description.statementofresponsibilityedited by Shlomi Dolev, Sachin Lodha.en_US
dc.format.extentXII, 307 p. 59 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;en_US
dc.relation.haspart9783319600802.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Science and Mathematicsen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputer graphics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectArtificial Intellen_US
dc.titleCyber Security Cryptography and Machine Learningen_US
dc.title.alternativeFirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319600802.pdf16.02 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDolev, Shlomi. ;en_US
dc.contributor.authorLodha, Sachin. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:54Z-
dc.date.available2020-05-17T08:27:54Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319600802 ;en_US
dc.identifier.isbn9783319600796 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1348-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319600796. ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ;en_US
dc.description.statementofresponsibilityedited by Shlomi Dolev, Sachin Lodha.en_US
dc.format.extentXII, 307 p. 59 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;en_US
dc.relation.haspart9783319600802.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Science and Mathematicsen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputer graphics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectArtificial Intellen_US
dc.titleCyber Security Cryptography and Machine Learningen_US
dc.title.alternativeFirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319600802.pdf16.02 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDolev, Shlomi. ;en_US
dc.contributor.authorLodha, Sachin. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:54Z-
dc.date.available2020-05-17T08:27:54Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319600802 ;en_US
dc.identifier.isbn9783319600796 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1348-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319600796. ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ;en_US
dc.description.statementofresponsibilityedited by Shlomi Dolev, Sachin Lodha.en_US
dc.format.extentXII, 307 p. 59 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;en_US
dc.relation.haspart9783319600802.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Science and Mathematicsen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputer graphics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectArtificial Intellen_US
dc.titleCyber Security Cryptography and Machine Learningen_US
dc.title.alternativeFirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319600802.pdf16.02 MBAdobe PDFThumbnail
Preview File