Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version) (Shlomi Dolev, Matan Liber).Pages 175-192Ī Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE (Imtiyazuddin Shaik, Ajeet Kumar Singh, Harika Narumanchi, Nitesh Emmadi, Rajan Mindigal Alasingara Bhattachar).Pages 193-218Ĭomparison of DNS Based Methods for Detecting Malicious Domains (Eyal Paz, Ehud Gudes).Pages 219-236Īverage-Case Competitive Ratio of Scheduling Algorithms of Multi-user Cache (Daniel Berend, Shlomi Dolev, Avinatan Hassidim, Marina Kogan-Sadetsky).Pages 237-244ĬryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption (Maya Bakshi, Mark Last).Pages 245-253īack Matter. SecureMCMR: Computation Outsourcing for MapReduce Applications (Lindsey Kennard, Ana Milanova).Pages 143-166Įvasion Is Not Enough: A Case Study of Android Malware (Harel Berger, Chen Hajaj, Amit Dvir).Pages 167-174 NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis (Ling Sun, David Gerault, Adrien Benamira, Thomas Peyrin).Pages 62-84Ĭan the Operator of a Drone Be Located by Following the Drone’s Path? (Eliyahu Mashhadi, Yossi Oren, Gera Weiss).Pages 85-93ĭetecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning (Nitesh Kumar, Ajay Singh, Anand Handa, Sandeep Kumar Shukla).Pages 94-109įast Polynomial Inversion for Post Quantum QC-MDPC Cryptography (Nir Drucker, Shay Gueron, Dusan Kostic).Pages 110-127Įfficient CORDIC-Based Sine and Cosine Implementation for a Dataflow Architecture (Daniel Khankin, Elad Raz, Ilan Tayari).Pages 128-142 Robust Malicious Domain Detection (Nitay Hason, Amit Dvir, Chen Hajaj).Pages 45-61 Security Ranking of IoT Devices Using an AHP Model (Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici).Pages 29-44 Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services (Moti Yung, Cem Paya, Daniel James).Pages 18-28 Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64 (Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle).Pages 1-17
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |