We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2019, skipping first 50

[ total of 237 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-237 ]
[ showing 50 entries per page: fewer | more | all ]
[51]  arXiv:1912.03735 [pdf, other]
Title: Security of Deep Learning Methodologies: Challenges and Opportunities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[52]  arXiv:1912.03790 [pdf, other]
Title: Hardening Random Forest Cyber Detectors Against Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[53]  arXiv:1912.03817 [pdf, other]
Title: Machine Unlearning
Comments: Published in IEEE S&P 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[54]  arXiv:1912.03848 [pdf, ps, other]
Title: Big Data Security Issues and Challenges in Healthcare
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[55]  arXiv:1912.04065 [pdf, ps, other]
Title: Delegated Proof of Reputation: a novel Blockchain consensus
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[56]  arXiv:1912.04143 [pdf, other]
Title: Political Elections Under (Social) Fire? Analysis and Detection of Propaganda on Twitter
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[57]  arXiv:1912.04145 [pdf, ps, other]
Title: Camouflage: Hardware-assisted CFI for the ARM Linux kernel
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:1912.04222 [pdf, other]
Title: Implementing the Exponential Mechanism with Base-2 Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:1912.04231 [pdf, other]
Title: Extended- Force vs Nudge : Comparing Users' Pattern Choices on SysPal and TinPal
Comments: Our paper is an extended version of ACM CCS 2019 poster by the same name. The paper is 32 pages long in ACM reference format. The paper has not been submitted to any journal or conference for the peer review
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:1912.04519 [pdf, ps, other]
Title: Analyzing the Kasiski Method Against Vigenere Cipher
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:1912.04613 [pdf, other]
Title: Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Comments: To appear at IEEE INFOCOM 2020
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:1912.04669 [pdf, other]
Title: Client-side Vulnerabilities in Commercial VPNs
Comments: A refined version of this draft, with the same title, has been published in the 24th Nordic Conference on Secure IT Systems (NordSec 19). It is accessible here: this https URL
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:1912.04726 [pdf, other]
Title: A Write-Friendly and Fast-Recovery Scheme for Security Metadata in NVM
Comments: 12 pages, 15 figures
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:1912.04735 [pdf, other]
Title: Covert Channel-Based Transmitter Authentication in Controller Area Networks
Comments: Submitted to TDSC (Transactions on Dependable and Secure Computing). arXiv admin note: text overlap with arXiv:1903.05231
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:1912.04746 [pdf, ps, other]
Title: On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks
Comments: Accepted in 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE 2019). arXiv admin note: substantial text overlap with arXiv:1905.01827
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:1912.04859 [pdf, ps, other]
Title: Privacy-Preserving Blockchain Based Federated Learning with Differential Data Sharing
Authors: Anudit Nagar
Comments: 9 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[67]  arXiv:1912.04865 [pdf, other]
Title: Security in Process: Visually Supported Triage Analysis in Industrial Process Data
Comments: VizSec 2019 Best Paper Award
Journal-ref: IEEE Transactions on Visualization and Computer Graphics, 2020 volume 26, number 4, pages 1638-1649
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:1912.04870 [pdf, ps, other]
Title: V0LTpwn: Attacking x86 Processor Integrity from Software
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:1912.05064 [pdf, other]
Title: Securing Fleets of Consumer Drones at Low Cost
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:1912.05182 [pdf, ps, other]
Title: A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[71]  arXiv:1912.05183 [pdf, other]
Title: Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Comments: 17 pages, 16 figures. Accepted in Network and Distributed Systems Security (NDSS) Symposium 2021
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:1912.05620 [pdf, other]
Title: Judge, Jury & Encryptioner: Exceptional Device Access with a Social Cost
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:1912.05721 [pdf, other]
Title: Using Deep Learning to Solve Computer Security Challenges: A Survey
Comments: 43 pages with 7 figures and two tables
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:1912.05849 [pdf, other]
Title: Exploiting Statistical and Structural Features for the Detection of Domain Generation Algorithms
Journal-ref: Journal of Information Security and Applications, Volume 58, 2021
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:1912.05861 [pdf, other]
Title: PEEPLL: Privacy-Enhanced Event Pseudonymisation with Limited Linkability
Comments: 10 pages. Extended version, Dec. 2019. A shortened version has been accepted for publication in the proceedings of the 35th ACM/SIGAPP Symposium On Applied Computing 2020
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:1912.05897 [pdf, other]
Title: HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning
Comments: 12 pages, AISec 2019
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:1912.06176 [pdf, other]
Title: Investigating the effectiveness of web adblockers
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[78]  arXiv:1912.06362 [pdf, ps, other]
Title: RSSI-based Secure Localization in the Presence of Malicious Nodes in Sensor Networks
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[79]  arXiv:1912.06412 [pdf, other]
Title: On Profitability of Nakamoto double spend
Comments: 15 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[80]  arXiv:1912.06485 [pdf, other]
Title: Blockchain Intelligence: When Blockchain Meets Artificial Intelligence
Comments: 5 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
[81]  arXiv:1912.06487 [pdf, ps, other]
Title: Augmenting Fiat Currency with an Integrated Managed Cryptocurrency
Authors: Peter Mell
Comments: Published in The Fourteenth International Conference on Software Engineering Advances (ICSEA) 2019, 8 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[82]  arXiv:1912.06491 [pdf, ps, other]
Title: Implementing a Protocol Native Managed Cryptocurrency
Comments: Published in The Fourteenth International Conference on Software Engineering Advances (ICSEA) 2019, 8 pages
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:1912.06497 [pdf, other]
Title: Founding The Domain of AI Forensics
Comments: Accepted for presentation at SafeAI2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[84]  arXiv:1912.06510 [pdf, other]
Title: Computer Viruses: The Abstract Theory Revisited
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:1912.06796 [pdf, other]
Title: Artificial Intelligence Techniques for Security Vulnerability Prevention
Authors: Steve Kommrusch
Comments: 7 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:1912.06812 [pdf, other]
Title: Cerberus: A Blockchain-Based Accreditation and Degree Verification System
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:1912.06817 [pdf, ps, other]
Title: Ten AI Stepping Stones for Cybersecurity
Authors: Ricardo Morla
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88]  arXiv:1912.06863 [pdf, other]
Title: Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems
Comments: The final version of this paper has been published in the Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC), 2019. 14 pages, 5 figures, 6 tables
Journal-ref: Proceedings of the 35th Annual Computer Security Applications Conference. ACM, 2019. p. 762-775
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[89]  arXiv:1912.06871 [pdf, other]
Title: Privacy-Preserving Claims Exchange Networks for Virtual Asset Service Providers
Comments: 4 figures
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:1912.07005 [pdf, other]
Title: A Statistical Explanation of the Timing Attack on QC-MDPC Code Crypto-system
Authors: Han Li
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:1912.07144 [pdf, ps, other]
Title: Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners
Comments: 75 pages
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:1912.07250 [src]
Title: Learning Malware Representation based on Execution Sequences
Comments: Incorrect experiment data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:1912.07283 [pdf, other]
Title: Misconfiguration Management of Network Security Components
Comments: 9 pages, 4 figures, 10 references, 7th International Symposium on System and Information Security (SSI), Sao Paulo, Brazil
Subjects: Cryptography and Security (cs.CR); Logic (math.LO)
[94]  arXiv:1912.07331 [pdf, other]
Title: Scalable Group Secret Key Generation over Wireless Channels
Comments: 11 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[95]  arXiv:1912.07497 [pdf, ps, other]
Title: BDoS: Blockchain Denial of Service
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:1912.07714 [pdf, other]
Title: Industrial robot ransomware: Akerbeltz
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:1912.07824 [pdf, other]
Title: SilentDelivery: Practical Timed-delivery of Private Information using Smart Contracts
Comments: This paper has been accepted by IEEE Transactions on Services Computing
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:1912.07908 [pdf, ps, other]
Title: Selecting efficient and reliable preservation strategies: modeling long-term information integrity using large-scale hierarchical discrete event simulation
Comments: Forthcoming IJDC 2022
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[99]  arXiv:1912.08094 [pdf, other]
Title: Proof of file access in a private P2P network using blockchain
Authors: Uwe Roth
Comments: 16 pages, 7 figures, 1 listing
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:1912.08191 [pdf, ps, other]
Title: Securing Big Data systems, A cybersecurity management discussion
Subjects: Cryptography and Security (cs.CR)
[ total of 237 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-237 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)