Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber security cryptography and mach...
~
(1998 :)
Cyber security cryptography and machine learningfirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyber security cryptography and machine learningedited by Shlomi Dolev, Sachin Lodha.
Reminder of title:
first International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /
remainder title:
CSCML 2017
other author:
Dolev, Shlomi.
corporate name:
Published:
Cham :Springer International Publishing :2017.
Description:
xii, 307 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science)
Online resource:
http://dx.doi.org/10.1007/978-3-319-60080-2
ISBN:
9783319600802$q(electronic bk.)
Cyber security cryptography and machine learningfirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /
Cyber security cryptography and machine learning
first International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /[electronic resource] :CSCML 2017edited by Shlomi Dolev, Sachin Lodha. - Cham :Springer International Publishing :2017. - xii, 307 p. :ill., digital ;24 cm. - Lecture notes in computer science,103320302-9743 ;. - Lecture notes in computer science ;4891..
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.
ISBN: 9783319600802$q(electronic bk.)
Standard No.: 10.1007/978-3-319-60080-2doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.824
Cyber security cryptography and machine learningfirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /
LDR
:02304nmm a2200337 a 4500
001
517650
003
DE-He213
005
20170601174935.0
006
m d
007
cr nn 008maaau
008
180316s2017 gw s 0 eng d
020
$a
9783319600802$q(electronic bk.)
020
$a
9783319600796$q(paper)
024
7
$a
10.1007/978-3-319-60080-2
$2
doi
035
$a
978-3-319-60080-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
I61 2017
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Cyber security cryptography and machine learning
$h
[electronic resource] :
$b
first International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /
$c
edited by Shlomi Dolev, Sachin Lodha.
246
3
$a
CSCML 2017
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
xii, 307 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
10332
520
$a
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
384606
650
0
$a
Machine learning
$v
Congresses.
$3
384498
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Data Encryption.
$3
273765
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
252959
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
274492
650
2 4
$a
Discrete Mathematics in Computer Science.
$3
274791
650
2 4
$a
Security.
$3
760527
700
1
$a
Dolev, Shlomi.
$3
279943
700
1
$a
Lodha, Sachin.
$3
787333
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-60080-2
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000145283
電子館藏
1圖書
電子書
EB QA76.9.A25 I61 2017
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-60080-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login