We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2021, skipping first 50

[ total of 285 entries: 1-10 | ... | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | ... | 281-285 ]
[ showing 10 entries per page: fewer | more | all ]
[51]  arXiv:2108.04575 [pdf, other]
Title: One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2108.04600 [pdf, other]
Title: Util::Lookup: Exploiting key decoding in cryptographic libraries
Journal-ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2108.04634 [pdf, other]
Title: Research trends, challenges, and emerging topics of digital forensics: A review of reviews
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2108.04754 [pdf, other]
Title: A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2108.04766 [pdf, ps, other]
Title: Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors
Comments: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17
Journal-ref: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[56]  arXiv:2108.04780 [pdf, other]
Title: Secure k-Anonymization over Encrypted Databases
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2108.04892 [pdf, other]
Title: Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption
Comments: Accepted at IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2021
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[58]  arXiv:2108.04974 [pdf, other]
Title: SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2108.04978 [pdf, other]
Title: Winning the NIST Contest: A scalable and general approach to differentially private synthetic data
Comments: 22 pages
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2108.04996 [pdf, ps, other]
Title: Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[ total of 285 entries: 1-10 | ... | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | ... | 281-285 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)