We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2020

[ total of 243 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 226-243 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:2001.00195 [pdf, other]
Title: Web APIs in Android through the Lens of Security
Comments: 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). London, Ontario, Canada, February 18-21, 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[2]  arXiv:2001.00226 [pdf, ps, other]
Title: With Great Power Comes Great Responsibility: Utilizing Privacy Technology for the Greater Bad
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2001.00486 [pdf, other]
Title: Reparo: Publicly Verifiable Layer to Repair Blockchains
Comments: Appeared in Financial Cryptography 2021 (this https URL)
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2001.00493 [pdf, other]
Title: Privacy for Rescue: A New Testimony Why Privacy is Vulnerable In Deep Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5]  arXiv:2001.00515 [pdf, other]
Title: Key-dependent Security of Stream Ciphers
Authors: Eric Filiol
Comments: 11 pages + 1 figure. This work has been presented in two parts at the Kaz'Hack'Stan 2019 conference in Nur-Sultan, Kazakhstan and at BSides Lisbon 2019, Lisbon, Portugal
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2001.00522 [pdf, ps, other]
Title: Schemes for Privacy Data Destruction in a NAND Flash Memory
Comments: Pages 181305 - 181313
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Systems and Control (eess.SY)
[7]  arXiv:2001.00694 [pdf, other]
Title: Differentially Private Combinatorial Cloud Auction
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2001.00747 [pdf, other]
Title: Improving PKI, BGP, and DNS Using Blockchain: A Systematic Review
Comments: 6 Pages, 2 Figures, ISC Turkey
Journal-ref: https://www.iscturkey.org/, 2019
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[9]  arXiv:2001.00771 [pdf, other]
Title: Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2001.00806 [pdf, ps, other]
Title: Verifying Cryptographic Security Implementations in C Using Automated Model Extraction
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[11]  arXiv:2001.00916 [pdf, ps, other]
Title: Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
Comments: 7 pages, 6 figures. 2019 NISS19: Proceedings of the 2nd International Conference on Networking, Information Systems & Security
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
[12]  arXiv:2001.00917 [pdf, ps, other]
Title: A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid
Comments: 6 pages, 6 Figures
Journal-ref: 2019 IEEE International Conference on Electro Information Technology (EIT)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
[13]  arXiv:2001.01071 [pdf, ps, other]
Title: DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Comments: Accepted to be Published in: Proceedings of the 2019 5th IEEE International Symposium on Smart Electronic Systems (IEEE-iSES), Dec. 16-18, 2019, Rourkela, India
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2001.01128 [pdf, other]
Title: Locality-Sensitive Hashing for Efficient Web Application Security Testing
Journal-ref: In Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP), pages 193-204 (2019)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[15]  arXiv:2001.01202 [pdf, other]
Title: Deep Face Representations for Differential Morphing Attack Detection
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2001.01204 [pdf, ps, other]
Title: Covert Association of Applications on Edge Devices by Processor Workload
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2001.01278 [pdf, other]
Title: Snappy: Fast On-chain Payments with Practical Collaterals
Comments: Network and Distributed Systems Security (NDSS) Symposium 2020, 23-26 February 2020, San Diego, CA, USA
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[18]  arXiv:2001.01387 [pdf, other]
Title: Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2001.01525 [pdf, other]
Title: UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2001.01618 [pdf, other]
Title: ARA : Aggregated RAPPOR and Analysis for Centralized Differential Privacy
Journal-ref: SN COMPUT. SCI. (2020) 1: 22
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[21]  arXiv:2001.01659 [pdf, other]
Title: KYChain: User-Controlled KYC Data Sharing and Certification
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2001.01825 [pdf, other]
Title: Protect Edge Privacy in Path Publishing with Differential Privacy
Authors: Zhigang Lu, Hong Shen
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2001.01837 [pdf, other]
Title: Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure
Comments: 9 pages, 4 Figures, 2 tables
Journal-ref: International Journal of Advanced Computer Sciences and Applications, Volume 9, Issue 10, 2018
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2001.01841 [pdf, other]
Title: Towards a secure behavior modeling for IoT networks using Blockchain
Comments: 15 Pages, 6 Figures, Workshops at the Second International Conference on Applied Informatics 2019
Journal-ref: CEUR Workshop Proceedings, Volume 2486, page 244-258, 2019
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2001.01848 [pdf, other]
Title: Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Comments: Accepted version of our work published in IEEE Transactions on Dependable and Secure Computing (TDSC, 2021)
Subjects: Cryptography and Security (cs.CR)
[ total of 243 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 226-243 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)