Description |
1 online resource (xii, 307 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 10332 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 10332. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology
|
Contents |
Cyber security.-Secure software development methodologies, formal methods semantics and verification of secure systems.-Fault tolerance, reliability, availability of distributed secure systems.- Game-theoretic approaches to secure computing.- Automatic recovery of self-stabilizing and self-organizing systems.- Communication, authentication and identification security.- Cyber security for mobile and Internet of things.- Cyber security of corporations.- Security and privacy for cloud, edge and fog computing.-Ccryptography.- Cryptographic implementation analysis and construction.- Secure multi-party computation.- Privacy-enhancing technologies and anonymity.- Post-quantum cryptography and security.- Machine learning and big data.- Anomaly detection and malware identification.- Business intelligence and security.- Digital forensics.- Digital rights management; trust management and reputation systems.- Information retrieval, risk analysis, DoS |
Summary |
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS |
Notes |
Includes author index |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed June 22, 2017) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Machine learning -- Congresses
|
|
Coding theory & cryptology.
|
|
Artificial intelligence.
|
|
Computer vision.
|
|
Discrete mathematics.
|
|
Computer security.
|
|
Computers -- Security -- General.
|
|
Computers -- Intelligence (AI) & Semantics.
|
|
Computers -- Computer Vision & Pattern Recognition.
|
|
Computers -- Data Processing.
|
|
Data encryption (Computer science)
|
|
Internet -- Security measures
|
|
Machine learning
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Dolev, Shlomi, editor
|
|
Lodha, Sachin, editor
|
ISBN |
9783319600802 |
|
331960080X |
|