


default search action
1st CSCML 2017: Beer-Sheva, Israel
- Shlomi Dolev

, Sachin Lodha:
Cyber Security Cryptography and Machine Learning - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings. Lecture Notes in Computer Science 10332, Springer 2017, ISBN 978-3-319-60079-6 - Daniel Apon, Chongwon Cho

, Karim Eldefrawy, Jonathan Katz:
Efficient, Reusable Fuzzy Extractors from LWE. 1-18 - Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon:

GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. 19-33 - Tomer Cohen, Danny Hendler, Dennis Potashnik:

Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract). 34-49 - Antonella Del Pozzo, Silvia Bonomi

, Riccardo Lazzeretti, Roberto Baldoni:
Building Regular Registers with Rational Malicious Servers and Anonymous Clients. 50-67 - Francesco Aldà, Hans Ulrich Simon

:
On the Optimality of the Exponential Mechanism. 68-85 - Hyang-Sook Lee, Seongan Lim, Ikkwon Yie:

On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups. 86-95 - Lukasz Krzywiecki

, Marta Wszola, Miroslaw Kutylowski:
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. 96-98 - Adam L. Young, Moti Yung:

The Combinatorics of Product Scanning Multiplication and Squaring. 99-114 - Edwin Dauber

, Rebekah Overdorf, Rachel Greenstadt:
Stylometric Authorship Attribution of Collaborative Documents. 115-135 - Filipp Valovich:

A Distributed Investment Encryption Scheme: Investcoin. 136-154 - Ziv Goldfeld, Paul W. Cuff, Haim H. Permuter

:
Physical Layer Security over Wiretap Channels with Random Parameters. 155-170 - Roberto Baldoni, Emilio Coppa

, Daniele Cono D'Elia
, Camil Demetrescu:
Assisting Malware Analysis with Symbolic Execution: A Case Study. 171-188 - Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma:

Brief Announcement: A Consent Management Solution for Enterprises. 189-192 - Nir Maoz, Ehud Gudes:

Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party. 193-195 - Sergey Frenkel, Victor N. Zakharov:

Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Faults and Attacks. 196-199 - Cody Freitag, Jonathan Katz, Nathan Klein

:
Symmetric-Key Broadcast Encryption: The Multi-sender Case. 200-214 - Michele Carminati

, Luca Valentini, Stefano Zanero
:
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System. 215-233 - Tom Gonda, Rami Puzis

, Bracha Shapira
:
Scalable Attack Path Finding for Increased Security. 234-249 - Ignacio Arnaldo, Alfredo Cuesta-Infante

, Ankit Arun, Mei Lam, Costas Bassias, Kalyan Veeramachaneni:
Learning Representations for Log Data in Cybersecurity. 250-268 - Hadar Polad, Rami Puzis

, Bracha Shapira
:
Attack Graph Obfuscation. 269-287 - Giuseppe Laurenza

, Leonardo Aniello, Riccardo Lazzeretti, Roberto Baldoni:
Malware Triage Based on Static Features and Public APT Reports. 288-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














