We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 70

[ total of 314 entries: 1-10 | ... | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | 91-100 | 101-110 | ... | 311-314 ]
[ showing 10 entries per page: fewer | more | all ]
[71]  arXiv:2004.06299 [pdf, other]
Title: Trusted Wireless Monitoring based on Blockchain over NB-IoT Connectivity
Comments: 7 pages, 6 figures, Accepted in IEEE Communication Magazine
Journal-ref: IEEE Communication Magazine 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72]  arXiv:2004.06348 [pdf, other]
Title: Distributed Privacy Preserving Iterative Summation Protocols
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[73]  arXiv:2004.06386 [pdf, other]
Title: Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Comments: To be published in the proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS'20)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[74]  arXiv:2004.06403 [pdf, other]
Title: PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions for Multiple Items
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2004.06417 [pdf, other]
Title: Resilient Self-Debugging Software Protection
Comments: 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2004.06432 [pdf, other]
Title: A Machine Learning-based Approach to Build Zero False-Positive IPSs for Industrial IoT and CPS with a Case Study on Power Grids Security
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2004.06563 [pdf, other]
Title: Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis
Comments: 20 pages, published in SecureComm 2019, see this https URL
Journal-ref: In International Conference on Security and Privacy in Communication Systems, pp. 278-298. Springer, Cham, 2019
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2004.06588 [pdf, ps, other]
Title: Towards Scalable Security in Interference Channels With Arbitrary Number of Users
Comments: Revision 2
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[79]  arXiv:2004.06672 [pdf, other]
Title: Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies
Authors: Thomas Groß
Comments: 40 pages. The short version of this paper is appearing in the Proceedings of the 9\textsuperscript{th} Workshop on Socio-Technical Aspects in Security (STAST 2019), pp. 1--24, LNCS, Springer Verlag (2020). Preregistered at the Open Science Framework: osf.io/549qn/
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2004.06700 [pdf, other]
Title: Secure Federated Learning in 5G Mobile Networks
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[ total of 314 entries: 1-10 | ... | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | 91-100 | 101-110 | ... | 311-314 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)