We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021, skipping first 50

[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]
[51]  arXiv:2101.02957 [pdf, ps, other]
Title: Observations on the Bias of Nonnegative Mechanisms for Differential Privacy
Journal-ref: AIMS Foundations of Data Science, December 2020
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[52]  arXiv:2101.02975 [pdf, other]
Title: Physical Layer Security based Key Management for LoRaWAN
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[53]  arXiv:2101.03022 [pdf, ps, other]
Title: Security Threats and Research Challenges of IoT-A Review
Comments: 13 pages. 1 table
Journal-ref: Journal of Engineering Advancements Vol. 01(04) 2020, pp 170-182
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[54]  arXiv:2101.03103 [pdf, other]
Title: Blockchain for steganography: advantages, new algorithms and open challenges
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2101.03118 [pdf, other]
Title: Simulating SQL Injection Vulnerability Exploitation Using Q-Learning Reinforcement Learning Agents
Comments: 20 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[56]  arXiv:2101.03209 [pdf, other]
Title: Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities
Comments: in IEEE Transactions on Emerging Topics in Computing (Early Access), 2020
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2101.03212 [pdf, other]
Title: Unveiling the I2P web structure: a connectivity analysis
Journal-ref: Computer Networks, vol. 194, 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[58]  arXiv:2101.03241 [pdf, ps, other]
Title: Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing
Comments: 29 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2101.03403 [pdf, other]
Title: CryptoEmu: An Instruction Set Emulator for Computation Over Ciphers
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2101.03564 [pdf, other]
Title: Cybersecurity of Industrial Cyber-Physical Systems: A Review
Comments: 32 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2101.03736 [pdf, other]
Title: Reachability Analysis for Attributes in ABAC with Group Hierarchy
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2101.03844 [pdf, other]
Title: Understanding the Quality of Container Security Vulnerability Detection Tools
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2101.03965 [pdf, other]
Title: FamDroid: Learning-Based Android Malware Family Classification Using Static Analysis
Comments: This manuscript has been submitted to Neurocomputing and is currently under its consideration for publication
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2101.04163 [pdf, ps, other]
Title: On the Practicality of Differential Privacy in Federated Learning by Tuning Iteration Times
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[65]  arXiv:2101.04173 [pdf, ps, other]
Title: Online rating system development using blockchain-based distributed ledger technology
Comments: 25 figures, 5 tables, Journal Wireless Netw (2021)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[66]  arXiv:2101.04194 [pdf, other]
Title: Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[67]  arXiv:2101.04244 [pdf, other]
Title: Multi-Perspective Trust Management Framework for Crowdsourced IoT Services
Comments: 14 pages, accepted and to appear in IEEE Ttransactions on Services Computing
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2101.04319 [pdf, other]
Title: DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Comments: The 36th ACM SIGAPP Symposium on Applied Computing (ACM SAC)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69]  arXiv:2101.04338 [pdf, other]
Title: A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes
Comments: 17 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[70]  arXiv:2101.04556 [pdf, other]
Title: Masking Host Identity on Internet: Encrypted TLS/SSL Handshake
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[71]  arXiv:2101.04575 [pdf, ps, other]
Title: Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation
Comments: 10 pages, 5 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Performance (cs.PF)
[72]  arXiv:2101.04766 [pdf, other]
Title: Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[73]  arXiv:2101.04829 [pdf, other]
Title: On the Effectiveness of Small Input Noise for Defending Against Query-based Black-Box Attacks
Comments: Accepted at WACV 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[74]  arXiv:2101.04888 [pdf, other]
Title: Crooked Indifferentiability Revisited
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2101.05067 [pdf, ps, other]
Title: UNSW-NB15 Computer Security Dataset: Analysis through Visualization
Comments: 17 singled spaced pages, 2 tables and 12 figures
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2101.05093 [pdf, ps, other]
Title: Protecting Privacy and Transforming COVID-19 Case Surveillance Datasets for Public Use
Comments: 19 pages, 4 figures, 1 table, 5 supplements
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[77]  arXiv:2101.05102 [pdf, other]
Title: ProFuzzBench: A Benchmark for Stateful Protocol Fuzzing
Comments: The source code of ProFuzzBench is available online on GitHub at: this https URL
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Software Engineering (cs.SE)
[78]  arXiv:2101.05105 [src]
Title: F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network
Comments: There was a major error in the paper I submitted, which led to a large error in the conclusion
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2101.05405 [pdf, other]
Title: Training Data Leakage Analysis in Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[80]  arXiv:2101.05495 [pdf, other]
Title: Selective Deletion in a Blockchain
Journal-ref: International Workshop on Blockchain and Mobile Applications (BlockApp 2020) during the International Conference on Distributed Computing Systems (ICDCS 2020)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Systems and Control (eess.SY)
[81]  arXiv:2101.05511 [pdf, other]
Title: Quantifying Blockchain Extractable Value: How dark is the forest?
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2101.05538 [pdf, other]
Title: Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems
Journal-ref: Model-driven Simulation and Training Environments for Cybersecurity (MSTEC 2020)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Systems and Control (eess.SY)
[83]  arXiv:2101.05589 [pdf, other]
Title: DeFi-ning DeFi: Challenges & Pathway
Authors: Hendrik Amler (1), Lisa Eckey (1), Sebastian Faust (1), Marcel Kaiser (2), Philipp Sandner (2), Benjamin Schlosser (1) ((1) Technical University of Darmstadt, (2) Frankfurt School of Finance and Management)
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2101.05614 [pdf, ps, other]
Title: Review on the Security Threats of Internet of Things
Comments: 9 Pages, 9 figures
Journal-ref: International Journal of Computer Applications (IJCA), 2020
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[85]  arXiv:2101.05646 [pdf, ps, other]
Title: Malicious Code Detection: Run Trace Output Analysis by LSTM
Comments: 11 pages, 5 figures, 5 tables, accepted to IEEE Access
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[86]  arXiv:2101.05735 [pdf, other]
Title: The Good, the Bad and the Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2101.05781 [pdf, other]
Title: Time-Based CAN Intrusion Detection Benchmark
Authors: Deborah H. Blevins (1), Pablo Moriano (2), Robert A. Bridges (2), Miki E. Verma (2), Michael D. Iannacone (2), Samuel C Hollifield (2) ((1) University of Kentucky, (2) Oak Ridge National Laboratory)
Comments: 7 pages, 2 figures
Journal-ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[88]  arXiv:2101.06000 [pdf, other]
Title: Horizon: A Gas-Efficient, Trustless Bridge for Cross-Chain Transactions
Comments: 14 Pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[89]  arXiv:2101.06039 [pdf, other]
Title: Secure Optimization Through Opaque Observations
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[90]  arXiv:2101.06043 [pdf, other]
Title: Bulwark: Holistic and Verified Security Monitoring of Web Protocols
Comments: Full version of the paper presented at ESORICS2020 (14-18 September 2020)
Journal-ref: ESORICS 2020: Computer Security (2020) 23-41
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2101.06124 [pdf, other]
Title: Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets
Comments: 31 pages, 3 figures, 10 tables; Modified table headings to make them readable
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2101.06137 [pdf, ps, other]
Title: Quantitative System-Level Security Verification of the IoV Infrastructure
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2101.06148 [pdf, other]
Title: SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2101.06204 [pdf, other]
Title: The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2101.06232 [pdf, ps, other]
Title: Towards interpreting ML-based automated malware detection models: a survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[96]  arXiv:2101.06291 [pdf, other]
Title: Lissy: Experimenting with on-chain order books
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:2101.06300 [pdf, other]
Title: CARE: Lightweight Attack Resilient Secure Boot Architecturewith Onboard Recovery for RISC-V based SOC
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2101.06308 [pdf, other]
Title: Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2101.06362 [pdf, other]
Title: SEDAT:Security Enhanced Device Attestation with TPM2.0
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[100]  arXiv:2101.06419 [pdf, other]
Title: Revisiting Driver Anonymity in ORide
Subjects: Cryptography and Security (cs.CR)
[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)