We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021, skipping first 100

[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]
[101]  arXiv:2101.06454 [pdf, other]
Title: AGChain: A Blockchain-based Gateway for Trustworthy App Delegation from Mobile App Markets
Comments: This is a technical report submitted to the Special Issue of the Elsevier Journal of Systems Architecture (JSA)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[102]  arXiv:2101.06519 [pdf, ps, other]
Title: Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study
Comments: 7 pages, 4 figures, 2 tables
Journal-ref: International Symposium on Security in Computing and Communication. SSCC 2019: Security in Computing and Communications
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2101.06676 [pdf, ps, other]
Title: A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
Comments: 5 pages, 13 figures, 5 tables, technical report of IEEE Consumer Electronics Magazine paper (Light-Edge)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[104]  arXiv:2101.06761 [pdf, other]
Title: A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Comments: Accepted paper at ICDE 2021 demonstrations track. arXiv admin note: substantial text overlap with arXiv:2010.13637
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Databases (cs.DB)
[105]  arXiv:2101.06896 [pdf, other]
Title: DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
Comments: ICSE 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[106]  arXiv:2101.07078 [pdf, other]
Title: SoK: Fully Homomorphic Encryption Compilers
Comments: 13 pages, to appear in IEEE Symposium on Security and Privacy 2021
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2101.07113 [pdf, ps, other]
Title: Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2101.07223 [pdf, other]
Title: Leveraging AI to optimize website structure discovery during Penetration Testing
Comments: J Comput Virol Hack Tech (2024)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[109]  arXiv:2101.07328 [pdf, other]
Title: MIMOSA: Reducing Malware Analysis Overhead with Coverings
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2101.07365 [pdf, other]
Title: Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[111]  arXiv:2101.07377 [pdf, ps, other]
Title: Panel: Humans and Technology for Inclusive Privacy and Security
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[112]  arXiv:2101.07769 [pdf, other]
Title: A System for Automated Open-Source Threat Intelligence Gathering and Management
Comments: Accepted paper at SIGMOD 2021 demonstrations track
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Databases (cs.DB)
[113]  arXiv:2101.07841 [pdf, other]
Title: Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2101.07897 [pdf, other]
Title: Safer Illinois and RokWall: Privacy Preserving University Health Apps for COVID-19
Comments: Appears in the Workshop on Secure IT Technologies against COVID-19(CoronaDef) 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[115]  arXiv:2101.07912 [pdf, other]
Title: Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic
Comments: Preprint for NATO CCDCOE Annual International Conference on Cyber Conflict (CyCon) [Paper submitted to Peer Review Process]
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[116]  arXiv:2101.08030 [pdf, ps, other]
Title: Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data
Comments: Will be published on Proceedings of the Workshop on Artificial Intelligence Safety (SafeAI 2021) co-located with 35th AAAI Conference on Artificial Intelligence (AAAI 2021)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[117]  arXiv:2101.08132 [pdf, ps, other]
Title: The (in)security of some recently proposed lightweight key distribution schemes
Authors: Chris J Mitchell
Comments: This version adds a brief critique of a related paper on secure multiparty computation
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2101.08177 [pdf, other]
Title: On Provable Backdoor Defense in Collaborative Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119]  arXiv:2101.08204 [pdf, other]
Title: secureTF: A Secure TensorFlow Framework
Comments: arXiv admin note: text overlap with arXiv:1902.04413
Journal-ref: Pages 44-59, 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[120]  arXiv:2101.08254 [pdf, other]
Title: RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[121]  arXiv:2101.08423 [pdf, other]
Title: Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[122]  arXiv:2101.08428 [pdf, ps, other]
Title: Introducing the Unitychain Structure: A novel blockchain-like structure that enables greater parallel processing, security, and performance for networks that leverage distributed key generation and classical consensus protocols
Authors: Joshua D. Tobkin
Comments: 16 pages, 7 Figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[123]  arXiv:2101.08429 [pdf, other]
Title: Malware Detection and Analysis: Challenges and Research Opportunities
Authors: Zahid Akhtar
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2101.08677 [pdf, other]
Title: Quantitative Security Risk Modeling and Analysis with RisQFLan
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[125]  arXiv:2101.08717 [pdf, other]
Title: Copycat CNN: Are Random Non-Labeled Data Enough to Steal Knowledge from Black-box Models?
Comments: The code is available at this https URL
Journal-ref: Pattern Recognition 113 (2021) 107830
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[126]  arXiv:2101.08754 [pdf, ps, other]
Title: An Efficient Communication Protocol for FPGA IP Protection
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[127]  arXiv:2101.08778 [pdf, other]
Title: SoK: Decentralized Finance (DeFi)
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[128]  arXiv:2101.08879 [pdf, other]
Title: Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies
Comments: Appeared in the Proceedings on Privacy Enhancing Technologies Symposium (PETS) 2022
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2101.08969 [pdf, ps, other]
Title: A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion
Authors: Yuzhou Lin
Comments: Some errors made in paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[130]  arXiv:2101.08997 [pdf, other]
Title: A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement
Journal-ref: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Dec 2020, Guangzhou, China
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2101.08998 [pdf, ps, other]
Title: Decision process for blockchain architectures based on requirements
Authors: Nicolas Six (CRI)
Journal-ref: CAiSE (Doctoral Consortium), 2020, Jun 2020, Grenoble, France. pp.53
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2101.09085 [pdf, ps, other]
Title: Privacy Friendly E-Ticketing For Public Transport
Comments: 31 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2101.09139 [pdf, ps, other]
Title: The Privacy-Utility Tradeoff of Robust Local Differential Privacy
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[134]  arXiv:2101.09162 [pdf, other]
Title: A Robust Blockchain Readiness Index Model
Comments: The final authenticated version is available online at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2101.09317 [pdf, ps, other]
Title: Short Secret Sharing Using Repeatable Random Sequence Generators
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2101.09365 [pdf, other]
Title: MAVERICK: Proactively detecting network control plane bugs using structural outlierness
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[137]  arXiv:2101.09381 [pdf, ps, other]
Title: An Enhanced Passkey Entry Protocol for Secure Simple Pairing in Bluetooth
Comments: 13 pages, 5 figures, original paper
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2101.09416 [pdf, other]
Title: Privacy Assured Recovery of Compressively Sensed ECG signals
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2101.09477 [pdf, ps, other]
Title: Trusted Data Notifications from Private Blockchains
Comments: 9 pages
Journal-ref: IEEE International Conference on Blockchain, Blockchain 2020, Rhodes Island, Greece, November 2-6, 2020, pages {53--61}
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[140]  arXiv:2101.09494 [pdf, ps, other]
Title: A DSA-like digital signature protocol
Journal-ref: JDMSC, 2020
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2101.09725 [pdf, ps, other]
Title: Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey
Journal-ref: in IEEE Access, vol. 9, pp. 37431-37455, 2021
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2101.09834 [pdf, other]
Title: Privacy Preserving Techniques Applied to CPNI Data: Analysis and Recommendations
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2101.10008 [pdf, ps, other]
Title: SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2101.10048 [pdf, ps, other]
Title: A Process to Facilitate Automated Automotive Cybersecurity Testing
Comments: 7 pages, 2 figures paper presented at IEEE VTC2021-Spring. Full published version at this https URL
Journal-ref: IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, pp. 1-7
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:2101.10063 [pdf, other]
Title: Few-Shot Website Fingerprinting Attack
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2101.10121 [pdf, ps, other]
Title: Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
Comments: 37 pages, 184 citations
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[147]  arXiv:2101.10181 [pdf, other]
Title: Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey
Comments: This paper is currently under revision
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[148]  arXiv:2101.10198 [pdf, other]
Title: Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[149]  arXiv:2101.10374 [pdf, ps, other]
Title: DAHash: Distribution Aware Tuning of Password Hashing Costs
Comments: 25 pages, 15 figures, Financial Crypto 2021
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[150]  arXiv:2101.10386 [pdf, other]
Title: ProbLock: Probability-based Logic Locking
Subjects: Cryptography and Security (cs.CR)
[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)