We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021, skipping first 150

[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]
[151]  arXiv:2101.10412 [pdf, ps, other]
Title: End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers
Comments: This research is 29 pages. It has 9 figures, and 7 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[152]  arXiv:2101.10464 [pdf, other]
Title: Personal Data Access Control Through Distributed Authorization
Journal-ref: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[153]  arXiv:2101.10474 [pdf, other]
Title: Towards an Open Format for Scalable System Telemetry
Comments: To be published in 2020 IEEE International Conference on Big Data (Big Data)
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2101.10522 [pdf, other]
Title: PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection
Comments: A new version of a previous submission with arXiv identifier arXiv:1910.07987. This version cannot be merged to the previous submission due to a title change
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2101.10569 [pdf, other]
Title: Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges
Comments: 22 pages, 8 figures, accepted by IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2101.10578 [pdf, other]
Title: Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Comments: Submitted version - Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS) 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[157]  arXiv:2101.10621 [pdf, other]
Title: xLumi: Payment Channel Protocol and Off-chain Payment in Blockchain Contract Systems
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2101.10631 [pdf, other]
Title: Biometric Verification Secure Against Malicious Adversaries
Authors: Amina Bassit (1), Florian Hahn (1), Joep Peeters (1), Tom Kevenaar (2), Raymond N.J. Veldhuis (1), Andreas Peter (1) ((1) University of Twente, (2) GenKey Netherlands B.V.)
Comments: This is a complete reworking and major expansion of our paper arXiv:1705.09936 * Reworking of original semi-honest protocol and its security proof * Major expansions: tailored zero-knowledge proofs; efficient variant of original protocol that we prove secure against malicious adversaries; extensive experimental evaluation using three different datasets; in-depth comparison with related work
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2101.10681 [pdf, other]
Title: What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics
Comments: 23 pages, 4 figures, 5 tables
Journal-ref: 25th International Conference on Financial Cryptography and Data Security (FC '21). March 01-05, 2021. Springer
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[160]  arXiv:2101.10699 [pdf, other]
Title: Measuring Decentralization in Bitcoin and Ethereum using Multiple Metrics and Granularities
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[161]  arXiv:2101.10729 [pdf, ps, other]
Title: Ethereum ECCPoW
Comments: It is under the review of IEEE Access
Journal-ref: IEEE Access, vol. 9, pp. 135942-135952, 2021
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2101.10852 [pdf, ps, other]
Title: How Much Communication Resource is Needed to Run a Wireless Blockchain Network?
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[163]  arXiv:2101.10856 [pdf, other]
Title: BE-RAN: Blockchain-enabled Open RAN with Decentralized Identity Management and Privacy-Preserving Communication
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[164]  arXiv:2101.10865 [pdf, other]
Title: On managing vulnerabilities in AI/ML systems
Comments: 16 pages. New Security Paradigms Workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[165]  arXiv:2101.10868 [pdf, other]
Title: An In-depth Review of Privacy Concerns Raised by the COVID-19 Pandemic
Authors: Jiaqi Wang
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[166]  arXiv:2101.10893 [pdf, other]
Title: Dynamic cyber risk estimation with Competitive Quantile Autoregression
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[167]  arXiv:2101.10904 [pdf, other]
Title: Untargeted Poisoning Attack Detection in Federated Learning via Behavior Attestation
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[168]  arXiv:2101.10920 [pdf, other]
Title: A Blockchain-based Trust System for Decentralised Applications: When trustless needs trust
Comments: 14 pages, 8 figures, submitted to Elsevier Future Generation Computer Systems jornal
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[169]  arXiv:2101.10921 [pdf, ps, other]
Title: Blockchain Technology: Introduction, Integration and Security Issues with IoT
Comments: 21 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2101.11060 [pdf, other]
Title: Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers
Journal-ref: This paper is published on European Conference on Computer Vision 2020, page 202-219, Springer
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[171]  arXiv:2101.11194 [pdf, ps, other]
Title: Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[172]  arXiv:2101.11404 [pdf, other]
Title: An Open-source Library of Large Integer Polynomial Multipliers
Comments: This paper has been accepted for conference proceeding in DDECS 2021 - April 7-9 2021 Vienna, Austria
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[173]  arXiv:2101.11502 [pdf, other]
Title: Randori: Local Differential Privacy for All
Authors: Boel Nelson
Comments: 25 pages
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2101.11611 [pdf, ps, other]
Title: Analyzing the Overhead of Filesystem Protection Using Linux Security Modules
Subjects: Cryptography and Security (cs.CR)
[175]  arXiv:2101.11720 [pdf, other]
Title: MiniV2G: An Electric Vehicle Charging Emulator
Subjects: Cryptography and Security (cs.CR)
[176]  arXiv:2101.11728 [pdf, other]
Title: SimBle: Generating privacy preserving real-world BLE traces with ground truth
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[177]  arXiv:2101.11866 [pdf, other]
Title: An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2101.11871 [pdf, other]
Title: Website fingerprinting on early QUIC traffic
Comments: This work has been accepted by Elsevier Computer Networks for publication
Journal-ref: Computer Networks 200 (2021) 108538
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[179]  arXiv:2101.11915 [pdf, other]
Title: Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[180]  arXiv:2101.12016 [pdf, other]
Title: Baseline Pruning-Based Approach to Trojan Detection in Neural Networks
Comments: The funding for all authors was provided by IARPA: IARPA-20001-D2020-2007180011
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[181]  arXiv:2101.12031 [pdf, other]
Title: Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Comments: Inf Syst Front (2020)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[182]  arXiv:2101.12078 [pdf, other]
Title: S++: A Fast and Deployable Secure-Computation Framework for Privacy-Preserving Neural Network Training
Comments: Appeared at the Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21). (7 pages, technical paper.)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[183]  arXiv:2101.12143 [pdf, other]
Title: Security, Fault Tolerance, and Communication Complexity in Distributed Systems
Comments: PhD thesis, Harvard University, Cambridge, Massachusetts, USA, May 1990. Some chapters report joint work
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[184]  arXiv:2101.12270 [pdf, other]
Title: An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Journal-ref: Sensors. 2021; 21(2):446
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[185]  arXiv:2101.12279 [pdf, other]
Title: GF-Flush: A GF(2) Algebraic Attack on Secure Scan Chains
Comments: Submitted to IEEE Transactions on Computer-Aided Design of Integrated Circuits And Systems
Subjects: Cryptography and Security (cs.CR)
[186]  arXiv:2101.12332 [pdf, ps, other]
Title: Atomic Swaps between Bitcoin and Monero
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2101.12412 [pdf, ps, other]
Title: Open problems in cross-chain protocols
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[188]  arXiv:2101.12434 [pdf, ps, other]
Title: Peeler: Profiling Kernel-Level Events to Detect Ransomware
Comments: 15 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[189]  arXiv:2101.12602 [pdf, other]
Title: On the differential privacy of dynamic location obfuscation with personalized error bounds
Comments: 9 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[190]  arXiv:2101.12604 [pdf, ps, other]
Title: Detection and Prevention of New Attacks for ID-based Authentication Protocols
Journal-ref: 9th ACM International Conference on Networks, Communication and Computing (ICNCC 2020)
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2101.12620 [pdf, ps, other]
Title: EphemeriShield -- defence against cyber-antisatellite weapons
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[192]  arXiv:2101.12723 [pdf, ps, other]
Title: State of the Art: Content-based and Hybrid Phishing Detection
Comments: 6 pages, 1 table
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2101.12736 [pdf, other]
Title: N-grams Bayesian Differential Privacy
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[194]  arXiv:2101.00157 (cross-list from cs.LG) [pdf, ps, other]
Title: Active Learning Under Malicious Mislabeling and Poisoning Attacks
Comments: 2021 IEEE Global Communications Conference (GLOBECOM)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[195]  arXiv:2101.00378 (cross-list from cs.NI) [pdf, other]
Title: Speeding up Block Propagation in Blockchain Network: Uncoded and Coded Designs
Comments: 10 pages, 8 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[196]  arXiv:2101.00522 (cross-list from cs.CV) [pdf, other]
Title: Domain Adaptation for the Segmentation of Confidential Medical Images
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[197]  arXiv:2101.00606 (cross-list from cs.CV) [pdf, other]
Title: News Image Steganography: A Novel Architecture Facilitates the Fake News Identification
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[198]  arXiv:2101.00612 (cross-list from cs.SE) [pdf, other]
Title: Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[199]  arXiv:2101.00676 (cross-list from cs.CV) [pdf, other]
Title: Fake Visual Content Detection Using Two-Stream Convolutional Neural Networks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[200]  arXiv:2101.01032 (cross-list from cs.CV) [pdf, other]
Title: Local Black-box Adversarial Attacks: A Query Efficient Approach
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)