We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 55

[ total of 338 entries: 1-25 | 6-30 | 31-55 | 56-80 | 81-105 | 106-130 | 131-155 | ... | 331-338 ]
[ showing 25 entries per page: fewer | more | all ]
[56]  arXiv:2111.03865 [pdf, other]
Title: Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[57]  arXiv:2111.03884 [pdf, ps, other]
Title: An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2111.04005 [pdf, other]
Title: Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2111.04210 [pdf, other]
Title: Towards Verifiable Remote Voting with Paper Assurance
Comments: Kristian Gj{\o}steen and Thomas Haines were supported by the Research Council of Norway and the Luxembourg National Research Fund (FNR), under the joint INTER project SURCVS (INTER/RCN//17/11747298/SURCVS/Ryan)
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2111.04222 [pdf, other]
Title: Not All Fabrics Are Created Equal: Exploring eFPGA Parameters For IP Redaction
Comments: 13 Pages
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[61]  arXiv:2111.04224 [pdf, other]
Title: Automated Detection of GDPR Disclosure Requirements in Privacy Policies using Deep Active Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[62]  arXiv:2111.04333 [pdf, other]
Title: threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Comments: 13 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2111.04367 [pdf, other]
Title: Sequence pairs related to produced graphs from a method for dividing a natural number by two
Comments: 9 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2111.04394 [pdf, other]
Title: Get a Model! Model Hijacking Attack Against Machine Learning Models
Comments: To Appear in NDSS 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[65]  arXiv:2111.04533 [pdf, ps, other]
Title: High-degree compression functions on alternative models of elliptic curves and their applications
Comments: 33 pages
Journal-ref: Fundamenta Informaticae, Volume 184, Issue 2 (January 27, 2022) fi:8689
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2111.04625 [pdf, other]
Title: DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[67]  arXiv:2111.04636 [pdf, other]
Title: Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates
Comments: Final version accepted in the journal Digital Communications and Networks. Version of Record: this https URL
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2111.04703 [pdf, other]
Title: HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[69]  arXiv:2111.04710 [pdf, other]
Title: OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Signal Processing (eess.SP)
[70]  arXiv:2111.04801 [pdf, other]
Title: Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing
Comments: 10 pages, 5 figures, in review at SECITC: this http URL
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[71]  arXiv:2111.04818 [pdf, other]
Title: Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption
Comments: Accepted at the 20th European Control Conference (ECC 2022)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[72]  arXiv:2111.04950 [pdf, other]
Title: Nash Equilibrium Control Policy against Bus-off Attacks in CAN Networks
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2111.04960 [pdf, ps, other]
Title: Information-Theoretic Limits for Steganography in Multimedia
Comments: Manuscript posted on 03.07.2021, 23:19 at "this https URL"
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[74]  arXiv:2111.05015 [pdf, ps, other]
Title: Cryptanalyze and design strong S-Box using 2D chaotic map and apply to irreversible key expansion
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2111.05096 [pdf, other]
Title: E-voting System Using Homomorphic Encryption and Blockchain Technology to Encrypt Voter Data
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2111.05101 [pdf, other]
Title: Chaotical PRNG based on composition of logistic and tent maps using deep-zoom
Comments: 11 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Chaotic Dynamics (nlin.CD)
[77]  arXiv:2111.05108 [pdf, other]
Title: "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Journal-ref: IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 2022, pp. 194-199
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[78]  arXiv:2111.05113 [pdf, other]
Title: Membership Inference Attacks Against Self-supervised Speech Models
Comments: Accepted to Interspeech 2022. Code will be available in the future
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[79]  arXiv:2111.05114 [pdf, other]
Title: Attack time analysis in dynamic attack trees via integer linear programming
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2111.05117 [pdf, other]
Title: AEAD Modes for ZUC Family Stream Ciphers
Comments: 13 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[ total of 338 entries: 1-25 | 6-30 | 31-55 | 56-80 | 81-105 | 106-130 | 131-155 | ... | 331-338 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)