We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 50

[ total of 338 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 326-338 ]
[ showing 25 entries per page: fewer | more | all ]
[51]  arXiv:2111.03537 [pdf, other]
Title: A practical analysis of ROP attacks
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2111.03573 [pdf, other]
Title: Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version)
Authors: David G. Balash (1), Xiaoyuan Wu (1), Miles Grant (1), Irwin Reyes (2), Adam J. Aviv (1) ((1) The George Washington University, (2) Two Six Technologies)
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2111.03596 [pdf, other]
Title: Phish What You Wish
Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[54]  arXiv:2111.03601 [pdf, ps, other]
Title: Security Header Fields in HTTP Clients
Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[55]  arXiv:2111.03859 [pdf, ps, other]
Title: Cryptography Vulnerabilities on HackerOne
Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2111.03865 [pdf, other]
Title: Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[57]  arXiv:2111.03884 [pdf, ps, other]
Title: An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2111.04005 [pdf, other]
Title: Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2111.04210 [pdf, other]
Title: Towards Verifiable Remote Voting with Paper Assurance
Comments: Kristian Gj{\o}steen and Thomas Haines were supported by the Research Council of Norway and the Luxembourg National Research Fund (FNR), under the joint INTER project SURCVS (INTER/RCN//17/11747298/SURCVS/Ryan)
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2111.04222 [pdf, other]
Title: Not All Fabrics Are Created Equal: Exploring eFPGA Parameters For IP Redaction
Comments: 13 Pages
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[61]  arXiv:2111.04224 [pdf, other]
Title: Automated Detection of GDPR Disclosure Requirements in Privacy Policies using Deep Active Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[62]  arXiv:2111.04333 [pdf, other]
Title: threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Comments: 13 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2111.04367 [pdf, other]
Title: Sequence pairs related to produced graphs from a method for dividing a natural number by two
Comments: 9 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2111.04394 [pdf, other]
Title: Get a Model! Model Hijacking Attack Against Machine Learning Models
Comments: To Appear in NDSS 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[65]  arXiv:2111.04533 [pdf, ps, other]
Title: High-degree compression functions on alternative models of elliptic curves and their applications
Comments: 33 pages
Journal-ref: Fundamenta Informaticae, Volume 184, Issue 2 (January 27, 2022) fi:8689
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2111.04625 [pdf, other]
Title: DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[67]  arXiv:2111.04636 [pdf, other]
Title: Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates
Comments: Final version accepted in the journal Digital Communications and Networks. Version of Record: this https URL
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2111.04703 [pdf, other]
Title: HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[69]  arXiv:2111.04710 [pdf, other]
Title: OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Signal Processing (eess.SP)
[70]  arXiv:2111.04801 [pdf, other]
Title: Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing
Comments: 10 pages, 5 figures, in review at SECITC: this http URL
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[71]  arXiv:2111.04818 [pdf, other]
Title: Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption
Comments: Accepted at the 20th European Control Conference (ECC 2022)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[72]  arXiv:2111.04950 [pdf, other]
Title: Nash Equilibrium Control Policy against Bus-off Attacks in CAN Networks
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2111.04960 [pdf, ps, other]
Title: Information-Theoretic Limits for Steganography in Multimedia
Comments: Manuscript posted on 03.07.2021, 23:19 at "this https URL"
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[74]  arXiv:2111.05015 [pdf, ps, other]
Title: Cryptanalyze and design strong S-Box using 2D chaotic map and apply to irreversible key expansion
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2111.05096 [pdf, other]
Title: E-voting System Using Homomorphic Encryption and Blockchain Technology to Encrypt Voter Data
Subjects: Cryptography and Security (cs.CR)
[ total of 338 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 326-338 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)