[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

10th SIN 2017: Jaipur, IN, India

Refine list

showing all ?? records

Cloud data security, access control and management

Hash functions, cryptography and cryptanalytic attacks

Security applications using cryptography

Security architecture and protocols

Machine learning and attack detection

Threat, anomaly and malware detection

Image classification, security and steganography

Data and system analysis, access permission, and secret sharing

Attacks and defences

Short papers

Extended abstracts