Single Tweakey Cryptanalysis of Reduced-Round Skinny-64.- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services.- Security Ranking of IoT Devices Using an AHP Model.- Robust Malicious Domain Detection.- NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis.- Can the Operator of a Drone be Located by Following the Drone's Path?.- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning.- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography.- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture.- SecureMCMR: Computation Outsourcing for MapReduce Applications.- Evasion is not enough: A Case Study of Android Malware.- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain.- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE.- Comparison of DNS based Methods for Detecting Malicious Domains.- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache.- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption.

Share This Book: