We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2019

[ total of 237 entries: 1-10 | 11-20 | 21-30 | 31-40 | ... | 231-237 ]
[ showing 10 entries per page: fewer | more | all ]
[1]  arXiv:1912.00007 [src]
Title: Randpay: The Technology for Blockchain Micropayments and Transactions Which Require Recipient's Consent
Comments: This document needs major revision and is not going to be updated
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:1912.00055 [pdf, other]
Title: Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version)
Comments: A shorter version is to appear in Knowledge and Information Systems journal
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[3]  arXiv:1912.00234 [pdf, ps, other]
Title: Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems
Comments: 6 pages; Paper accepted and presented at ECAI 2015 - 7th International Conference Electronics, Computers and Artificial Intelligence, 25 June -27 June, 2015, Bucharest, ROM\^ANIA
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1912.00264 [pdf, other]
Title: Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[5]  arXiv:1912.00288 [pdf, other]
Title: Towards end-to-end verifiable online voting: adding verifiability to established voting systems
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1912.00317 [pdf, other]
Title: An Observational Investigation of Reverse Engineers' Processes
Comments: 22 pages, 6 figures, to appear at the 2020 USENIX Security Symposium
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[7]  arXiv:1912.00329 [pdf, other]
Title: SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1912.00442 [pdf, other]
Title: PACLP: a fine-grained partition-based access control policy language for provenance
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[9]  arXiv:1912.00445 [pdf, other]
Title: Purpose-based access policy on provenance and data algebra
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1912.00446 [pdf, ps, other]
Title: Zero knowledge proofs for cloud storage integrity checking
Subjects: Cryptography and Security (cs.CR)
[ total of 237 entries: 1-10 | 11-20 | 21-30 | 31-40 | ... | 231-237 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)