Skip to main content
  • Conference proceedings
  • © 2017

Cyber Security Cryptography and Machine Learning

First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10332)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CSCML: International Symposium on Cyber Security, Cryptology, and Machine Learning

Conference proceedings info: CSCML 2017.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

    Pages I-XII
  2. Efficient, Reusable Fuzzy Extractors from LWE

    • Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
    Pages 1-18
  3. GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation

    • Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart Gibson, Julio Hernandez-Castro, Christopher Solomon
    Pages 19-33
  4. Supervised Detection of Infected Machines Using Anti-virus Induced Labels

    • Tomer Cohen, Danny Hendler, Dennis Potashnik
    Pages 34-49
  5. Building Regular Registers with Rational Malicious Servers and Anonymous Clients

    • Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni
    Pages 50-67
  6. On the Optimality of the Exponential Mechanism

    • Francesco Aldà, Hans Ulrich Simon
    Pages 68-85
  7. On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups

    • Hyang-Sook Lee, Seongan Lim, Ikkwon Yie
    Pages 86-95
  8. Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage

    • Łukasz Krzywiecki, Marta Wszoła, Mirosław Kutyłowski
    Pages 96-98
  9. Stylometric Authorship Attribution of Collaborative Documents

    • Edwin Dauber, Rebekah Overdorf, Rachel Greenstadt
    Pages 115-135
  10. Physical Layer Security over Wiretap Channels with Random Parameters

    • Ziv Goldfeld, Paul Cuff, Haim H. Permuter
    Pages 155-170
  11. Assisting Malware Analysis with Symbolic Execution: A Case Study

    • Roberto Baldoni, Emilio Coppa, Daniele Cono D’Elia, Camil Demetrescu
    Pages 171-188
  12. Brief Announcement: A Consent Management Solution for Enterprises

    • Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma
    Pages 189-192
  13. Symmetric-Key Broadcast Encryption: The Multi-sender Case

    • Cody Freitag, Jonathan Katz, Nathan Klein
    Pages 200-214
  14. A Supervised Auto-Tuning Approach for a Banking Fraud Detection System

    • Michele Carminati, Luca Valentini, Stefano Zanero
    Pages 215-233
  15. Scalable Attack Path Finding for Increased Security

    • Tom Gonda, Rami Puzis, Bracha Shapira
    Pages 234-249
  16. Learning Representations for Log Data in Cybersecurity

    • Ignacio Arnaldo, Alfredo Cuesta-Infante, Ankit Arun, Mei Lam, Costas Bassias, Kalyan Veeramachaneni
    Pages 250-268

Other Volumes

  1. Cyber Security Cryptography and Machine Learning

About this book

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.

The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction;  secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.

Editors and Affiliations

  • Ben-Gurion University of the Negev , Beer-Sheva, Israel

    Shlomi Dolev

  • Tata Consultancy Services (India) , Chennai, India

    Sachin Lodha

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access