We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Mar 2020

[ total of 285 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 276-285 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:2003.00003 [pdf, other]
Title: Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2003.00118 [pdf, other]
Title: Assuring the Integrity of Videos from Wireless-based IoT Devices using Blockchain
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[3]  arXiv:2003.00175 [pdf, other]
Title: DangKiller: Eliminating Dangling Pointers Efficiently via Implicit Identifier
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[4]  arXiv:2003.00294 [pdf, other]
Title: Improving Sustainability of Cryptocurrency Payment Networks for IoT Applications
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[5]  arXiv:2003.00296 [pdf, ps, other]
Title: Renegotiation and recursion in Bitcoin contracts
Comments: Full version of the paper presented at COORDINATION 2020
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[6]  arXiv:2003.00395 [pdf, other]
Title: Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review
Comments: 34 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[7]  arXiv:2003.00405 [pdf]
Title: Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection
Comments: 6 pages
Journal-ref: International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), 28-29th January 2018, Tamil Nadu, India
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2003.00476 [src]
Title: 1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data
Comments: Need more polishing
Journal-ref: IEEE ICAIIC 2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[9]  arXiv:2003.00542 [pdf, other]
Title: User profiling using smartphone network traffic analysis
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2003.00572 [pdf, other]
Title: Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)
Comments: Accepted at Usenix Security 2020
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2003.00578 [pdf, ps, other]
Title: Quantum Indistinguishability for Public Key Encryption
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2003.00610 [pdf, other]
Title: Gimme That Model!: A Trusted ML Model Trading Protocol
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13]  arXiv:2003.00801 [pdf, other]
Title: BitcoinF: Achieving Fairness for Bitcoin in Transaction-Fee-Only Model
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[14]  arXiv:2003.00862 [pdf, other]
Title: TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[15]  arXiv:2003.00903 [pdf, other]
Title: Atomic Crosschain Transactions White Paper
Comments: 8 pages, 8 figures, 3 code listings. arXiv admin note: substantial text overlap with arXiv:1911.08083
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2003.00916 [pdf, other]
Title: Code Renewability for Native Software Protection
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2003.00971 [pdf]
Title: Graphing Website Relationships for Risk Prediction: Identifying Derived Threats to Users Based on Known Indicators
Comments: 10 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Networking and Internet Architecture (cs.NI)
[18]  arXiv:2003.00973 [pdf, other]
Title: Differential Privacy at Risk: Bridging Randomness and Privacy Budget
Comments: Presented in Workshop on Privacy Preserving AI (PPAI) at AAAI, 2020
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Statistics Theory (math.ST); Machine Learning (stat.ML)
[19]  arXiv:2003.01031 [pdf, other]
Title: Exploring Backdoor Poisoning Attacks Against Malware Classifiers
Comments: 19 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2003.01218 [pdf, other]
Title: A First Step Towards Understanding Real-world Attacks on IoT Devices
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2003.01261 [pdf, other]
Title: Adversarial Network Traffic: Towards Evaluating the Robustness of Deep Learning-Based Network Traffic Classification
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2003.01518 [pdf, other]
Title: SoK: A Survey of Open Source Threat Emulators
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2003.01782 [pdf, other]
Title: Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack
Comments: Project page: this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[24]  arXiv:2003.01801 [pdf, other]
Title: $\text{A}^3$: Activation Anomaly Analysis
Comments: The first two authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2003.01985 [pdf, other]
Title: Revisiting Security Vulnerabilities in Commercial Password Managers
Comments: This is an accepted manuscript to appear in the proceedings of the 35th Int'l Conf. on ICT Systems Security & Privacy Protection (IFIP SEC 2020), Maribor, Slovenia
Subjects: Cryptography and Security (cs.CR)
[ total of 285 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 276-285 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2007, contact, help  (Access key information)