10. SIN 2017: Jaipur, IN, India

Cloud data security, access control and management

Hash functions, cryptography and cryptanalytic attacks

Security applications using cryptography

Security architecture and protocols

Machine learning and attack detection

Threat, anomaly and malware detection

Image classification, security and steganography

Data and system analysis, access permission, and secret sharing

Attacks and defences

Short papers

Extended abstracts

a service of Schloss Dagstuhl - Leibniz Center for Informatics