We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jul 2021, skipping first 275

[ total of 299 entries: 1-25 | ... | 201-225 | 226-250 | 251-275 | 276-299 ]
[ showing 25 entries per page: fewer | more | all ]
[276]  arXiv:2107.12699 (cross-list from cs.SE) [pdf, other]
Title: A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI
Comments: Proceedings of the 18th Annual International Conference on Privacy, Security and Trust (PST 2021), Auckland (online), IEEE, pp. 1-10
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[277]  arXiv:2107.12867 (cross-list from cs.PL) [pdf, other]
Title: From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware
Comments: 18 pages, 4 figures, Network and Distributed Systems Security (NDSS) Symposium 2021
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
[278]  arXiv:2107.12958 (cross-list from cs.DC) [pdf, other]
Title: Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[279]  arXiv:2107.12981 (cross-list from cs.DC) [pdf, ps, other]
Title: Cross-Referencing Method for Scalable Public Blockchain
Comments: (29 pages, 18 figures, Internet of Things 15 (2021) 100419)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[280]  arXiv:2107.12997 (cross-list from cs.LG) [pdf, other]
Title: Fully Homomorphically Encrypted Deep Learning as a Service
Comments: 8 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[281]  arXiv:2107.13047 (cross-list from cs.DB) [pdf, other]
Title: RingBFT: Resilient Consensus over Sharded Ring Topology
Comments: In proceedings of EDBT 2022
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[282]  arXiv:2107.13639 (cross-list from cs.LG) [pdf, other]
Title: Imbalanced Adversarial Training with Reweighting
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[283]  arXiv:2107.13723 (cross-list from cs.SE) [pdf, other]
Title: An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages
Comments: To be published in EMSE
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[284]  arXiv:2107.13876 (cross-list from cs.IR) [pdf, other]
Title: Understanding the Effects of Adversarial Personalized Ranking Optimization Method on Recommendation Quality
Comments: 5 pages
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[285]  arXiv:2107.14065 (cross-list from cs.CY) [pdf, ps, other]
Title: Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[286]  arXiv:2107.14082 (cross-list from cs.CY) [pdf, ps, other]
Title: Social engineering: Concepts, Techniques and Security Countermeasures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[287]  arXiv:2107.14093 (cross-list from cs.CY) [pdf, other]
Title: A Decision Model for Decentralized Autonomous Organization Platform Selection: Three Industry Case Studies
Authors: Elena Baninemeh (1), Siamak Farshidi (2), Slinger Jansen (1) ((1) Department of Information and Computer Science at Utrecht University, Utrecht, the Netherlands, (2) Informatics Institute at University of Amsterdam, Amsterdam, the Netherlands)
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[288]  arXiv:2107.14110 (cross-list from cs.LG) [pdf, other]
Title: Enhancing Adversarial Robustness via Test-time Transformation Ensembling
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[289]  arXiv:2107.14582 (cross-list from cs.LG) [src]
Title: NeuralDP Differentially private neural networks by design
Comments: Paper withdrawn. The paper contains a factual error
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[290]  arXiv:2107.14586 (cross-list from cs.CL) [pdf, ps, other]
Title: An Efficient DP-SGD Mechanism for Large Scale NLP Models
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[291]  arXiv:2107.14601 (cross-list from cs.LG) [pdf, other]
Title: Who's Afraid of Thomas Bayes?
Authors: Erick Galinkin
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[292]  arXiv:2107.01885 (cross-list from eess.IV) [pdf, ps, other]
Title: PRNU Based Source Camera Identification for Webcam Videos
Comments: 4 pages, 3 figures, 3 tables
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR)
[293]  arXiv:2107.02648 (cross-list from quant-ph) [src]
Title: A new family of quantum synchronizable codes from negacyclic codes
Comments: Some errors with this article
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[294]  arXiv:2107.05675 (cross-list from eess.SP) [pdf, ps, other]
Title: Quality of Service Guarantees for Physical Unclonable Functions
Comments: To appear in the IEEE International Workshop on Information Forensics and Security 2021
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[295]  arXiv:2107.06183 (cross-list from eess.SP) [pdf, ps, other]
Title: A Self-Regulated and Reconfigurable CMOS Physically Unclonable Function Featuring Zero-Overhead Stabilization
Authors: Dai Li, Kaiyuan Yang
Comments: This work has been accepted by 2020 IEEE Journal of Solid-State Circuits (JSSC)
Journal-ref: IEEE Journal of Solid-State Circuits (JSSC), Volume: 55, Issue: 1, Pages: 98-107, Jan. 2020
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[296]  arXiv:2107.09059 (cross-list from math.DS) [pdf, ps, other]
Title: Ergodic dynamical systems over the Cartesian power of the ring of p-adic integers
Authors: Valerii Sopin
Comments: T-Functions of several variables: New Criteria for Transitivity
Journal-ref: P-Adic Num Ultrametr Anal Appl 6, 333-336 (2014)
Subjects: Dynamical Systems (math.DS); Cryptography and Security (cs.CR)
[297]  arXiv:2107.12724 (cross-list from quant-ph) [pdf, other]
Title: Quantum Meet-in-the-Middle Attack on Feistel Construction
Comments: 18 pages, 3 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[298]  arXiv:2107.12974 (cross-list from quant-ph) [pdf, other]
Title: Practical quantum multiparty signatures using quantum-key-distribution networks
Comments: 18 pages, 5 figures
Journal-ref: Phys. Rev. A 105, 012408 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[299]  arXiv:2107.13360 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Technologies in the Telecommunications Industry
Journal-ref: EPJ Quantum Technology 8:19 (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[ total of 299 entries: 1-25 | ... | 201-225 | 226-250 | 251-275 | 276-299 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)