We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2019, skipping first 125

[ total of 237 entries: 1-25 | ... | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-237 ]
[ showing 25 entries per page: fewer | more | all ]
[126]  arXiv:1912.11153 [pdf, other]
Title: PAGURUS: Low-Overhead Dynamic Information Flow Tracking on Loosely Coupled Accelerators
Comments: Published in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[127]  arXiv:1912.11249 [pdf, ps, other]
Title: Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[128]  arXiv:1912.11283 [pdf, ps, other]
Title: An Analisys of Application Logs with Splunk : developing an App for the synthetic analysis of data and security incidents
Authors: Roberto Bruzzese
Comments: 32 pages, 32 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[129]  arXiv:1912.11299 [pdf, other]
Title: Introducing the Robot Vulnerability Database (RVD)
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[130]  arXiv:1912.11328 [pdf, other]
Title: Assessing differentially private deep learning with Membership Inference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:1912.11401 [pdf, ps, other]
Title: On the Decentralized Generation of theRSA Moduli in Multi-Party Settings
Comments: The submission contains 14 pages and 12 figures. The conference to submit is not determined yet
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[132]  arXiv:1912.11523 [pdf, other]
Title: JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Comments: Accepted to IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2020, Issue 3
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[133]  arXiv:1912.11531 [pdf, other]
Title: Pseudo Random Number Generation: a Reinforcement Learning approach
Comments: 13 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[134]  arXiv:1912.11541 [pdf, other]
Title: Characterizing Orphan Transactions in the Bitcoin Network
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:1912.11546 [pdf, ps, other]
Title: Fast Generation of RSA Keys using Smooth Integers
Comments: This paper contains 11 pages and 8 tables, in IEEE Transactions on Computers
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:1912.11588 [pdf, other]
Title: Next-Generation Big Data Federation Access Control: A Reference Model
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:1912.11598 [pdf, other]
Title: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures
Journal-ref: IEEE Open Journal of the Computer Society, 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[138]  arXiv:1912.11617 [pdf, ps, other]
Title: Efficient Algorithm for the Linear Complexity of Sequences and Some Related Consequences
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[139]  arXiv:1912.11721 [pdf, other]
Title: A Closer Look at Mobile App Usage as a Persistent Biometric: A Small Case Study
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[140]  arXiv:1912.11745 [pdf, other]
Title: Proof of Federated Learning: A Novel Energy-recycling Consensus Algorithm
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:1912.11831 [pdf, other]
Title: Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders
Authors: Mustafizur Rahman Shahid (SAMOVAR), Gregory Blanc (SAMOVAR), Zonghua Zhang (SAMOVAR), Hervé Debar (SAMOVAR)
Journal-ref: 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), Sep 2019, Cambridge, United States. pp.1-5
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Signal Processing (eess.SP)
[142]  arXiv:1912.11951 [pdf, other]
Title: EVA: An Encrypted Vector Arithmetic Language and Compiler for Efficient Homomorphic Computation
Journal-ref: Programming Language Design and Implementation (PLDI 2020) 546-561
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL)
[143]  arXiv:1912.12043 [pdf, ps, other]
Title: Implementation of XTEA Encryption Protocol based on IEEE 802.15.4 Wireless Systems
Comments: in Ukrainian
Journal-ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 6(2), 2019
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[144]  arXiv:1912.12122 [pdf, other]
Title: Deep Learning Based Android Malware Detection Framework
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:1912.12141 [pdf, other]
Title: encointer -- Local Community Cryptocurrencies with Universal Basic Income
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[146]  arXiv:1912.12143 [pdf, ps, other]
Title: A Secure Authentication Technique in Internet of Medical Things through Machine Learning
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:1912.12172 [pdf, ps, other]
Title: Defense against Lion Attack in Cognitive Radio Systems using the Markov Decision Process Approach
Journal-ref: Frequenz, 2014
Subjects: Cryptography and Security (cs.CR)
[148]  arXiv:1912.12173 [pdf, ps, other]
Title: Game-theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems
Journal-ref: Journal of Circuits, Systems and Computers, 2016
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[149]  arXiv:1912.12174 [pdf, ps, other]
Title: An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:1912.12221 [pdf, other]
Title: Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow
Comments: Accepted to International Conference on Advances in the Emerging Computing Technologies (AECT) 2020
Subjects: Cryptography and Security (cs.CR)
[ total of 237 entries: 1-25 | ... | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-237 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)