We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 50

[ total of 314 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[51]  arXiv:2004.04676 [pdf, other]
Title: An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies
Comments: 10 pages, 2 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[52]  arXiv:2004.04692 [pdf, other]
Title: Rethinking the Trigger of Backdoor Attack
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[53]  arXiv:2004.04909 [pdf, other]
Title: A Framework for Behavior Privacy Preserving in Radio Frequency Signal
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[54]  arXiv:2004.05116 [pdf, other]
Title: A note on blind contact tracing at scale with applications to the COVID-19 pandemic
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2004.05248 [pdf, other]
Title: Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity
Comments: Invited paper for the 2020 National Cyber Summit, June 2-4, 2020, in Huntsville, AL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[56]  arXiv:2004.05251 [pdf, other]
Title: CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2004.05258 [pdf, other]
Title: Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification
Comments: 11 pages with 10figures. This is the accepted version of the paper published in IEEE COMPSAC 2022. The published version is available at this http URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[58]  arXiv:2004.05265 [pdf, other]
Title: Visual Spoofing in content based spam detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[59]  arXiv:2004.05289 [pdf, other]
Title: Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[60]  arXiv:2004.05419 [pdf, other]
Title: A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context
Comments: 16 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2004.05500 [pdf, ps, other]
Title: Analysing Flow Security Properties in Virtualised Computing Systems
Authors: Chunyan Mu
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[62]  arXiv:2004.05523 [pdf, other]
Title: DeepEDN: A Deep Learning-based Image Encryption and Decryption Network for Internet of Medical Things
Journal-ref: IEEE Internet of Things Journal,2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[63]  arXiv:2004.05574 [pdf, other]
Title: PrivEdge: From Local to Distributed Private Training and Prediction
Comments: IEEE Transactions on Information Forensics and Security (TIFS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2004.05597 [pdf, ps, other]
Title: How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes
Authors: Chris J Mitchell
Comments: This version adds a brief analysis of a recently published group authentication scheme very closely related to one of the three analysed key pre-distribution schemes
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2004.05693 [pdf, other]
Title: SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space
Comments: 19 pages, 9 figures, submitted to Computers & Security, accepted
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2004.05817 [pdf, other]
Title: Blockchain in the Internet of Things: Architectures and Implementation
Journal-ref: in Proc. IEEE Computer Software and Applications Conference, COMPSAC, 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[67]  arXiv:2004.06080 [pdf, other]
Title: Which Blockchain to choose? A decision support tool to guide the choice of a Blockchain technology
Authors: Nicolas Six (CRI), Nicolas Herbaut (CRI), Camille Salinesi (CRI)
Comments: in French
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2004.06081 [pdf, ps, other]
Title: COVID-19 Blockchain Framework: Innovative Approach
Authors: Mohamed Torky, Aboul Ella Hassanien (Scientific Research Group in Egypt)
Comments: 22 pages, 11 Figures
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2004.06195 [pdf, other]
Title: AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs
Authors: Mordechai Guri
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2004.06235 [pdf, other]
Title: ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things
Comments: arXiv admin note: text overlap with arXiv:1909.00493
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2004.06299 [pdf, other]
Title: Trusted Wireless Monitoring based on Blockchain over NB-IoT Connectivity
Comments: 7 pages, 6 figures, Accepted in IEEE Communication Magazine
Journal-ref: IEEE Communication Magazine 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72]  arXiv:2004.06348 [pdf, other]
Title: Distributed Privacy Preserving Iterative Summation Protocols
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[73]  arXiv:2004.06386 [pdf, other]
Title: Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Comments: To be published in the proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS'20)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[74]  arXiv:2004.06403 [pdf, other]
Title: PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions for Multiple Items
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2004.06417 [pdf, other]
Title: Resilient Self-Debugging Software Protection
Comments: 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[ total of 314 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)