We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 25

[ total of 314 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[26]  arXiv:2004.02354 [pdf, other]
Title: DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping
Comments: Preprint of the work accepted at the Design Automation Conference (DAC) 2020
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[27]  arXiv:2004.02516 [pdf, ps, other]
Title: Security Analysis and Design for TAGA: a Touch and Go Assistant in the Aerospace Domain
Comments: 19 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2004.02543 [pdf]
Title: SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[29]  arXiv:2004.02770 [pdf, other]
Title: Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Comments: 6 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Signal Processing (eess.SP)
[30]  arXiv:2004.02796 [pdf, other]
Title: Certifying Provenance of Scientific Datasets with Self-sovereign Identity and Verifiable Credentials
Comments: Submitted to 12th International Workshop on Science Gateways (IWSG 2020), 10-12 June 2020
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2004.03002 [pdf, ps, other]
Title: Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users
Comments: 45 pages, 4 figures. To appear on FORC 2020
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2004.03178 [pdf, other]
Title: Challenges and Opportunities in CPS Security: A Physics-based Perspective
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[33]  arXiv:2004.03216 [pdf]
Title: Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST)
Authors: Jinfeng Li
Comments: This paper has been published in Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-8, Vol. 4, No. 3, 1st July 2020. Available at: this https URL
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-8, Vol. 4, No. 3, 1st July 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[34]  arXiv:2004.03369 [pdf]
Title: Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
Comments: 14 pages,7 figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[35]  arXiv:2004.03407 [pdf, other]
Title: Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems
Comments: 17 pages, 14 figures, IEEE Transactions on Mobile Computing (TMC). arXiv admin note: substantial text overlap with arXiv:1807.02706
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2004.03544 [pdf, other]
Title: PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing
Comments: 22 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2004.03728 [pdf, other]
Title: Practical Data Poisoning Attack against Next-Item Recommendation
Journal-ref: Proceedings of The Web Conference 2020
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[38]  arXiv:2004.03756 [pdf, other]
Title: DashCam Pay: A System for In-vehicle Payments Using Face and Voice
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[39]  arXiv:2004.03841 [pdf, other]
Title: Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes
Comments: This version has been accepted in ACM Transactions on Cyber-Physical Systems (TCPS). A preliminary version of this paper was accepted in ACM Conference on Data and Application Security and Privacy (CODASPY) 2019. arXiv admin note: substantial text overlap with arXiv:1901.08618
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[40]  arXiv:2004.03960 [pdf]
Title: High Accuracy Phishing Detection Based on Convolutional Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41]  arXiv:2004.03976 [pdf]
Title: Improved Secure Efficient Delegated Private Set Intersection
Comments: 6 pages, presented in proceedings of the 28th Iranian Conference on Electrical Engineering (ICEE 2020). Final version of the paper has been added
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2004.04059 [pdf, other]
Title: TraceSecure: Towards Privacy Preserving Contact Tracing
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2004.04145 [pdf, ps, other]
[44]  arXiv:2004.04457 [pdf, other]
Title: The Blob: provable incompressibility and traceability in the whitebox model
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2004.04497 [pdf, other]
Title: Efficient and Secure Flash-based Gaming CAPTCH
Journal-ref: Journal of Parallel and Distributed Computing, 2020
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2004.04597 [pdf, other]
Title: Challenges in Forecasting Malicious Events from Incomplete Data
Comments: Accepted in The Fifth Workshop on Computational Methods in Online Misbehavior, Companion Proceedings of The 2020 World Wide Web Conference (WWW '20)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[47]  arXiv:2004.04605 [pdf, ps, other]
Title: The cost of Bitcoin mining has never really increased
Authors: Yo-Der Song, Tomaso Aste (University College London)
Comments: 16 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); General Finance (q-fin.GN)
[48]  arXiv:2004.04626 [pdf]
Title: Do you need a blockchain in construction? Use case categories and decision framework for DLT design options
Comments: to be published in Advanced Engineering Informatics
Journal-ref: Advanced Engineering Informatics, Volume 45, August 2020, 101094
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2004.04631 [pdf, other]
Title: Private Knowledge Transfer via Model Distillation with Generative Adversarial Networks
Authors: Di Gao, Cheng Zhuo
Comments: 9 pages, 4 figures, ECAI 2020, the 24th European Conference on Artificial Intelligence
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[50]  arXiv:2004.04647 [pdf, other]
Title: Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[ total of 314 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2301, contact, help  (Access key information)