We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020

[ total of 314 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:2004.00108 [pdf, ps, other]
Title: How to transform the Apple's application 'Find My' into a toolbox for whistleblowers
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2004.00234 [pdf, other]
Title: Botnet Detection Using Recurrent Variational Autoencoder
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2004.00282 [pdf, ps, other]
Title: An Efficient Anonymous Authentication Scheme Using Registration List in VANETs
Comments: 5 pages, 4 figures, Accepted for ICEE2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[4]  arXiv:2004.00318 [pdf, ps, other]
Title: Research of Caller ID Spoofing Launch, Detection, and Defense
Journal-ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 7(3), 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[5]  arXiv:2004.00333 [pdf, other]
Title: Probing Channel Balances in the Lightning Network
Comments: 12 pages 5 figures
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2004.00509 [pdf, ps, other]
Title: On the privacy of a code-based single-server computational PIR scheme
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[7]  arXiv:2004.00939 [pdf, other]
Title: CORSICA: Cross-Origin Web Service Identification
Comments: Accepted to ASIACCS2020
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2004.00948 [pdf, other]
Title: Two high capacity text steganography schemes based on color coding
Comments: 19 pages , 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2004.01045 [pdf, other]
Title: Topological Properties of Multi-Party Blockchain Transactions
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[10]  arXiv:2004.01220 [pdf, ps, other]
Title: Automated Attacker Synthesis for Distributed Protocols
Comments: 24 pages, 15 figures
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)
[11]  arXiv:2004.01312 [pdf, other]
Title: Preserving Statistical Privacy in Distributed Optimization
Comments: The updated version has simpler proofs. The paper has been peer-reviewed, and accepted for the IEEE Control Systems Letters (L-CSS 2021)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[12]  arXiv:2004.01343 [pdf, ps, other]
Title: Efficient UAV Physical Layer Security based on Deep Learning and Artificial Noise
Comments: 8 pages, 3 tables, 19 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Signal Processing (eess.SP)
[13]  arXiv:2004.01403 [pdf, ps, other]
Title: A "Final" Security Bug
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2004.01556 [pdf, ps, other]
Title: Phishing Attacks: Detection And Prevention
Comments: 5 pages, 7 figures, 1 table, essential information
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2004.01712 [pdf, other]
Title: RAPPER: Ransomware Prevention via Performance Counters
Comments: Australian Workshop on Offensive Cryptography, Kangacrypt 2018. arXiv admin note: substantial text overlap with arXiv:1802.03909
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[16]  arXiv:2004.01749 [pdf, other]
Title: Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam
Comments: 30 pages, 33 figures. Extended journal version of arXiv:1906.10762
Journal-ref: J. Cyber Secur. Mobil. 9 (2), 2020, 265-300
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2004.01807 [pdf, other]
Title: TRRespass: Exploiting the Many Sides of Target Row Refresh
Authors: Pietro Frigo (1), Emanuele Vannacci (1), Hasan Hassan (2), Victor van der Veen (3), Onur Mutlu (2), Cristiano Giuffrida (1), Herbert Bos (1), Kaveh Razavi (1) ((1) Vrije Universiteit Amsterdam, (2) ETH Zurich, (3) Qualcomm Technologies Inc.)
Comments: 16 pages, 16 figures, in proceedings IEEE S&P 2020
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2004.01855 [pdf, other]
Title: Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies
Comments: This is the 2nd version (improved based on reviewers feedback) of the accepted paper at 13th International Conference on Computational Intelligence in Security for Information Systems
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2004.01891 [pdf, ps, other]
Title: Scalar Product Lattice Computation for Efficient Privacy-preserving Systems
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2004.01958 [pdf, other]
Title: BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
Comments: 32 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[21]  arXiv:2004.02020 [pdf, other]
Title: Building secure distributed applications the DECENT way
Comments: 17 pages, 21 figures. V3: Added a section to introduce a distributed revoker design; Added details on Decent Handshake protocol; Revised the description on data sealing mechanism; Added a discussion of future research directions related to automatic component verification; Added and replaced 11 figures; V2: Added formal verification result for the protocols; clarified verifiers and revokers
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[22]  arXiv:2004.02183 [pdf, other]
Title: Approximate Manifold Defense Against Multiple Adversarial Perturbations
Comments: Workshop on Machine Learning with Guarantees, NeurIPS 2019. IJCNN, 2020 (full paper)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[23]  arXiv:2004.02229 [pdf, other]
Title: FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning
Comments: Revised version, contains some more experiments and fixes minor typos in the paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2004.02245 [pdf, ps, other]
Title: Investigations on c-(almost) perfect nonlinear functions
Comments: arXiv admin note: text overlap with arXiv:1909.03628
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO); Number Theory (math.NT)
[25]  arXiv:2004.02264 [pdf, other]
Title: PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Comments: In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop (CCSW'19)
Subjects: Cryptography and Security (cs.CR)
[ total of 314 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)