<div dir="ltr"><div class="gmail_default" style="font-family:verdana,sans-serif;color:#000000"><div class="gmail_default" style="font-family:Arial,Helvetica,sans-serif"><span style="font-family:verdana,sans-serif">Dear Colleagues,</span><br></div><div class="gmail_default" style="font-family:Arial,Helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:Arial,Helvetica,sans-serif"><b style="background-color:transparent;color:rgb(28,30,41);font-family:verdana,sans-serif">The February 14th deadline is approaching!</b><font face="verdana, sans-serif"><br></font></div><div style="color:rgb(34,34,34);font-family:Arial,Helvetica,sans-serif"><div dir="rtl"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="margin:0px;padding:0px 0px 20px;width:970px;font-size:medium"><div id="gmail-m_-5567081320043394966gmail-m_732138212580433302gmail-m_5079851441327497296gmail-m_1453887818511123192gmail-m_-6132013305993039657gmail-:1mr8" style="font-size:0.875rem;direction:ltr;margin:8px 0px 0px;padding:0px"><div id="gmail-m_-5567081320043394966gmail-m_732138212580433302gmail-m_5079851441327497296gmail-m_1453887818511123192gmail-m_-6132013305993039657gmail-:1h7a" style="overflow:hidden;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:small;line-height:1.5"><div dir="ltr"><div class="gmail_default" style="color:rgb(0,0,0)"><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></span></p><div class="gmail_default"><font face="verdana, sans-serif">Please see below the Call for Papers for CSCML 2020</font></div><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">------------------------------------------------------------------</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">We apologize for any possible duplicates of this message.</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">------------------------------------------------------------------------</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><div style="color:rgb(34,34,34)"><b>Keynote speakers: </b></div><div style="color:rgb(34,34,34)"><a href="https://en.wikipedia.org/wiki/Dov_Moran">Dov Moran</a> - Grove Ventures (the inventor the <a href="https://en.wikipedia.org/wiki/USB_memory_stick" title="" target="_blank" style="color:rgb(11,0,128);background-image:none;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-family:sans-serif;font-size:14px">USB memory stick</a>) </div><div style="color:rgb(34,34,34)">and <a href="https://www.liverpool.ac.uk/computer-science/staff/paul-spirakis/">Prof. Paul Spirakis</a> - University of Liverpool (<span style="font-family:sans-serif;font-size:14px"> EATCS </span><span style="color:rgb(0,0,0)">Fellow</span><span style="font-family:sans-serif;font-size:14px">)</span> </div><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><br></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">You are cordially invited to submit to the Fourth International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2020) that will take place on <b>July 2-3, 2020 </b>in Saal Auditorium (202), located in Alon Building for Hi-Tech (37) at Ben-Gurion University (Marcus Family Campus), Beer-Sheva, Israel:</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="font-family:verdana,sans-serif"><br></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="font-family:verdana,sans-serif">1. Original Research: submission of a paper of up to 15 pages with an expected presentation time of <b>20 or 25 minutes</b>. Accepted papers will be published in Springer LNCS; in addition, a special issue of the journal Information and Computation will be dedicated to selected papers from CSCML 2020.</span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="font-family:verdana,sans-serif"><br></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="font-family:verdana,sans-serif">2. Entrepreneurship Pitch: submission of a Powerpoint/PDF abstract of up to 6 pages accompanied by a presentation of<b> 5 to 10 minutes</b>. Accepted pitches will be presented during the "Entrepreneurship Pitch Track" in front of VCs and industry experts. In addition, the selected 3 best pitches will receive a certificate for 'excellence of innovation'.</span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">3. Student Research: submission of an abstract of up to 3 pages accompanied by a short presentation. Those submissions that are accepted will be gathered in a technical report. Please note, that the deadline for Student Research Submission is LATER than March 18, 2018.</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">4. "Capture the Flag" Hackathon on cybersecurity is planned to take place during the first day of the symposium.</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Paper Submission <b><u>Deadline</u></b>: <b>February 14, 2020</b></font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Authors Notification Due: March 20, 2020</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Camera-Ready Copy Due: March 31, 2020</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><b>Early Registration Due: June 1, 2020</b></font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Conference Date: <b>2-3, July 2020</b></font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Scope of the Conference: </font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"> Original contributions to the theory, design, analysis, implementation, or application of cybersecurity, cryptography, and machine learning systems and networks, and, in particular, of conceptually innovative results are solicited. Topics of interest include, but are not limited to:</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Cyber Security Design</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Secure Software Development Methodologies</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Formal methods, semantics, and verification of secure systems</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Fault tolerance, reliability, availability of distributed secure systems</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Game-theoretic approaches to secure computing</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Automatic recovery self-stabilizing, and self-organizing systems</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Communication, authentication and identification security</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Cybersecurity for Mobile and Internet of Things</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Cybersecurity of corporations</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Security and privacy for cloud, Edge and Fog computing</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Cryptocurrency</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Blockchain</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Cryptography</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Cryptographic implementation analysis and construction</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Secure multi-party computation</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Privacy-enhancing technologies and anonymity</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Post-quantum cryptography and security</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Machine Learning & Big Data</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Anomaly detection and malware identification</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Business Intelligence and Security</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Digital Forensics, Digital Rights Management</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Trust management and Reputation Systems</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">• Information retrieval, Risk analysis, DoS</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">The Symposium is an international forum for researchers, entrepreneurs, and practitioners in the theory, design, analysis, implementation, or application of cybersecurity, cryptography, and machine learning systems and networks; and, in particular, of conceptually innovative results. </font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Friday, July 3rd, will be dedicated to networking during a field seminar in the Negev. Networking among the researchers, the entrepreneurs, the VCs and the industry participants.</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Please be sure to spread the word to anyone you think may be interested in submitting and/or attending. </font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">We're looking forward to meeting you at CSCML 2020!</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><a href="https://www.cs.bgu.ac.il/~fradmin/cscml20/index.html" target="_blank" style="color:rgb(74,110,224);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">https://www.cs.bgu.ac.il/~fradmin/cscml20/index.html</font></span></a></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Please note, that the website is still under construction.</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">The PDF version of the Call for Papers can be found here:</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><a href="https://www.cs.bgu.ac.il/~fradmin/cscml20/cscml20.pdf" target="_blank" style="color:rgb(74,110,224);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">https://www.cs.bgu.ac.il/~fradmin/cscml20/cscml20.pdf</font></span></a></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">We apologize for any possible duplicates of this message.</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt">If you would like to unsubscribe from this mailing list please send an email message to </span><a href="mailto:fradmin.cs@gmail.com" target="_blank" style="color:rgb(74,110,224);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt">n</span></a><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><a href="mailto:hsa@post.bgu.ac.il" target="_blank">hsa@post.bgu.ac.il</a> and in the body of the message type "Unsubscribe".</span></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Vladimir Kolesnikov and Gera Weiss</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Program Committee Chairs</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Shlomi Dolev and Sachin Lodha</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">General Chairs</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">In the name of the Steering Committee:</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif"><br></font></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Orna Berry, DELL EMC, Israel</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Shlomi Dolev, Chair, Ben-Gurion University, Israel</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Yuval Elovici, Ben-Gurion University, Israel</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Ehud Gudes, Ben-Gurion University, Israel</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Jonathan Katz, University of Maryland, USA</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Rafail Ostrovsky, UCLA, USA</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Jeffrey D. Ullman, Stanford University, USA</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Kalyan Veeramachaneni, MIT, USA</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Yaron Wolfsthal, IBM, Israel</font></span></p><p style="color:rgb(28,30,41);background:transparent;margin-top:0pt;margin-bottom:0pt"><span style="background:transparent;margin-top:0pt;margin-bottom:0pt"><font face="verdana, sans-serif">Moti Yung, Columbia University and Snapchat, USA<br></font></span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div><div dir="rtl" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="font-size:12.8px;font-style:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255)"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="color:rgb(34,34,34);font-size:12.8px"><font face="arial narrow, sans-serif"><br></font></div><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><div style="font-size:12.8px"><font color="#000000" face="arial narrow, sans-serif">Ms. Simcha Mahler</font></div><div dir="rtl" style="text-align:left;font-size:12.8px"><span style="color:rgb(0,0,0);font-size:12.8px"><font face="arial narrow, sans-serif">שמחה מהלר</font></span></div><div dir="rtl" style="text-align:left;font-size:12.8px"><font face="arial narrow, sans-serif"><span style="color:rgb(0,0,0);font-size:12.8px">Manager of Operations</span><br></font></div></div></div><div style="color:rgb(34,34,34);font-size:12.8px;font-style:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255)"><span style="color:rgb(80,0,80)"><div style="font-size:12.8px"><font face="arial narrow, sans-serif"><font color="#000000"><div style="font-size:12.8px">BGU Negev Hi-Tech <span style="font-size:12.8px">Faculty Startup Accelerator</span></div>Computer Science Department, BGU</font><br><a href="http://in.bgu.ac.il/en/natural_science/cs/NHSA" style="color:rgb(17,85,204)" target="_blank">NHSA - מנט"ע</a></font></div></span><div style="font-size:12.8px"><font face="arial narrow, sans-serif">+972-8-642-8100</font></div><div style="font-size:12.8px"><font face="arial narrow, sans-serif"><a href="mailto:nhsa@post.bgu.ac.il" style="color:rgb(17,85,204)" target="_blank">nhsa@post.bgu.ac.il</a><a href="mailto:nhsa@post.bgu.ac.il" style="color:rgb(17,85,204)" target="_blank"><br></a></font></div></div><p class="MsoNormal" style="color:rgb(80,0,80);background-image:initial;background-position:initial;background-repeat:initial"><font face="arial narrow, sans-serif"><span style="font-size:12.8px"></span></font></p><div style="margin:2px 0px 0px;font-size:12.8px"><img src="https://drive.google.com/a/post.bgu.ac.il/uc?id=1GhpfwzPk2Agos1LZJrHUcPwy65KLhI9h&export=download" width="200" height="70" style="font-size:12.8px"><br></div><div style="margin:2px 0px 0px;font-size:12.8px"><br></div><div style="margin:2px 0px 0px;font-size:12.8px"><br></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>