Cyber Security Cryptography and Machine Learning

First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings

  • Shlomi Dolev
  • Sachin Lodha
Conference proceedings CSCML 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10332)

Also part of the Security and Cryptology book sub series (LNSC, volume 10332)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
    Pages 1-18
  3. Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart Gibson, Julio Hernandez-Castro, Christopher Solomon
    Pages 19-33
  4. Tomer Cohen, Danny Hendler, Dennis Potashnik
    Pages 34-49
  5. Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni
    Pages 50-67
  6. Francesco Aldà, Hans Ulrich Simon
    Pages 68-85
  7. Hyang-Sook Lee, Seongan Lim, Ikkwon Yie
    Pages 86-95
  8. Łukasz Krzywiecki, Marta Wszoła, Mirosław Kutyłowski
    Pages 96-98
  9. Edwin Dauber, Rebekah Overdorf, Rachel Greenstadt
    Pages 115-135
  10. Ziv Goldfeld, Paul Cuff, Haim H. Permuter
    Pages 155-170
  11. Roberto Baldoni, Emilio Coppa, Daniele Cono D’Elia, Camil Demetrescu
    Pages 171-188
  12. Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma
    Pages 189-192
  13. Cody Freitag, Jonathan Katz, Nathan Klein
    Pages 200-214
  14. Michele Carminati, Luca Valentini, Stefano Zanero
    Pages 215-233
  15. Tom Gonda, Rami Puzis, Bracha Shapira
    Pages 234-249
  16. Ignacio Arnaldo, Alfredo Cuesta-Infante, Ankit Arun, Mei Lam, Costas Bassias, Kalyan Veeramachaneni
    Pages 250-268
  17. Hadar Polad, Rami Puzis, Bracha Shapira
    Pages 269-287
  18. Giuseppe Laurenza, Leonardo Aniello, Riccardo Lazzeretti, Roberto Baldoni
    Pages 288-305
  19. Back Matter
    Pages 307-307

About these proceedings


This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.

The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction;  secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.


algorithms authentication classification computer crime computer operating systems computer programming languages cybersecurity data privacy data security encryption face recognition image processing Internet machine learning malwares network security privacy security signal processing Support Vector Machines (SVM)

Editors and affiliations

  • Shlomi Dolev
    • 1
  • Sachin Lodha
    • 2
  1. 1.Ben-Gurion University of the Negev Beer-ShevaIsrael
  2. 2.Tata Consultancy Services (India) ChennaiIndia

Bibliographic information