Cryptography and Security
Authors and titles for cs.CR in Jan 2022
[ total of 333 entries: 1-100 | 101-200 | 201-300 | 301-333 ][ showing 100 entries per page: fewer | more | all ]
- [1] arXiv:2201.00031 [pdf, ps, other]
-
Title: Privacy-Protecting COVID-19 Exposure Notification Based on Cluster EventsAuthors: Paul SyversonComments: 11 pages. This paper was presented at the NIST Workshop on Challenges for Digital Proximity Detection in Pandemics: Privacy, Accuracy, and Impact, January 28 02021Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [2] arXiv:2201.00099 [pdf, other]
-
Title: Differential Privacy Made EasyAuthors: Muhammad AitsamSubjects: Cryptography and Security (cs.CR)
- [3] arXiv:2201.00231 [pdf, ps, other]
-
Title: An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contractsComments: extended version of a paper published in The 14th International Symposium on Foundations and Practice of Security, FPS 2021, 8-10 December 2021Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [4] arXiv:2201.00419 [pdf, other]
-
Title: VISAS -- Detecting GPS spoofing attacks against drones by analyzing camera's video streamComments: 8 pages, 16 figuresSubjects: Cryptography and Security (cs.CR)
- [5] arXiv:2201.00484 [pdf, ps, other]
-
Title: Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing PlatformSubjects: Cryptography and Security (cs.CR)
- [6] arXiv:2201.00568 [pdf, ps, other]
- [7] arXiv:2201.00584 [pdf, ps, other]
-
Title: Feature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based ClassificationSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Neural and Evolutionary Computing (cs.NE)
- [8] arXiv:2201.00757 [pdf, other]
-
Title: Rank-1 Similarity Matrix Decomposition For Modeling Changes in Antivirus Consensus Through TimeSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [9] arXiv:2201.00759 [pdf, other]
-
Title: MetaChain: A Novel Blockchain-based Framework for Metaverse ApplicationsSubjects: Cryptography and Security (cs.CR)
- [10] arXiv:2201.00763 [pdf, other]
-
Title: DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model InspectionComments: 18 pages, 8 figures; to appear in the Network and Distributed System Security Symposium (NDSS)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [11] arXiv:2201.00815 [pdf, other]
- [12] arXiv:2201.00858 [pdf, other]
-
Title: Blockchain Nash Dynamics and the Pursuit of ComplianceSubjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
- [13] arXiv:2201.00864 [pdf, other]
-
Title: Secret Sharing Sharing For Highly Scalable Secure AggregationComments: 12 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [14] arXiv:2201.00900 [pdf, other]
-
Title: A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesComments: to be Published in ACM Computing Surveys (2022)Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [15] arXiv:2201.01051 [pdf, ps, other]
-
Title: Open Access Dataset for Electromyography based Multi-code Biometric AuthenticationComments: manuscript for open access dataset (paper and appendix)Journal-ref: Sci Data 9, 733 (2022)Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
- [16] arXiv:2201.01130 [pdf, other]
-
Title: Reusing Verification Assertions as Security Checkers for Hardware Trojan DetectionComments: 6 pages, 6 figuresJournal-ref: 2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 2022, pp. 1-6Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [17] arXiv:2201.01147 [pdf, ps, other]
-
Title: Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA AttacksComments: Author's version accepted for DTIS-2018; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [18] arXiv:2201.01153 [pdf, ps, other]
-
Title: On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal AttackComments: Author's version accepted for ReConFig-2019; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [19] arXiv:2201.01158 [pdf, ps, other]
-
Title: Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic CurvesComments: Author's version accepted for DSD-2020; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [20] arXiv:2201.01262 [pdf, other]
-
Title: An algebraic attack to the Bluetooth stream cipher E0Comments: 24 pages, 1 figure. To appear in Finite Fields and Their ApplicationsSubjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC); Commutative Algebra (math.AC); Rings and Algebras (math.RA)
- [21] arXiv:2201.01326 [pdf, ps, other]
-
Title: OConsent -- Open Consent Protocol for Privacy and Consent Management with BlockchainAuthors: Subhadip MitraSubjects: Cryptography and Security (cs.CR)
- [22] arXiv:2201.01350 [pdf, other]
-
Title: Prospects for Improving Password SelectionSubjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
- [23] arXiv:2201.01574 [pdf, other]
-
Title: Reinforcing Cybersecurity Hands-on Training With Adaptive LearningComments: IEEE FIE 2021 conference, 9 pages, 6 figures, 4 tablesSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [24] arXiv:2201.01621 [pdf, other]
-
Title: ROOM: Adversarial Machine Learning Attacks Under Real-Time ConstraintsComments: 12 pagesSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [25] arXiv:2201.01649 [pdf, other]
-
Title: WebSpec: Towards Machine-Checked Analysis of Browser Security MechanismsAuthors: Lorenzo Veronese, Benjamin Farinier, Pedro Bernardo, Mauro Tempesta, Marco Squarcina, Matteo MaffeiComments: Submitted to IEEE S&P '23 on 19 Aug 2022Subjects: Cryptography and Security (cs.CR)
- [26] arXiv:2201.01711 [pdf, ps, other]
-
Title: Horizontal SCA Attacks against kP Algorithm Using K-Means and PCASubjects: Cryptography and Security (cs.CR)
- [27] arXiv:2201.01717 [pdf, ps, other]
-
Title: Clustering versus Statistical Analysis for SCA: when Machine Learning is BetterSubjects: Cryptography and Security (cs.CR)
- [28] arXiv:2201.01834 [pdf, other]
-
Title: Secure Remote Attestation with Strong Key Insulation GuaranteesSubjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [29] arXiv:2201.01927 [pdf, ps, other]
-
Title: Network Generations and the Security Challenge in IoT ApplicationsAuthors: Mahmoud S. FayedSubjects: Cryptography and Security (cs.CR)
- [30] arXiv:2201.01989 [pdf, other]
-
Title: SPDL: Blockchain-secured and Privacy-preserving Decentralized LearningComments: 11 pages, 7 figuresSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [31] arXiv:2201.02007 [pdf, ps, other]
-
Title: Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCAComments: Author's version accepted for ReConFig-2018; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [32] arXiv:2201.02236 [pdf, other]
-
Title: Detecting Anomalies using Overlapping Electrical Measurements in Smart Power GridsSubjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
- [33] arXiv:2201.02351 [pdf, other]
-
Title: Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber DeceptionComments: 16 pages, accepted at IEEE Transactions on Automatic ControlSubjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Systems and Control (eess.SY)
- [34] arXiv:2201.02358 [pdf, other]
-
Title: Towards Trustworthy DeFi Oracles: Past,Present and FutureComments: Under reviewSubjects: Cryptography and Security (cs.CR)
- [35] arXiv:2201.02391 [pdf, ps, other]
-
Title: Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA AttacksComments: Author's version accepted for ICICS-2017; the final publication is available at Springer via this https URLSubjects: Cryptography and Security (cs.CR)
- [36] arXiv:2201.02506 [pdf, ps, other]
-
Title: Evaluation of Cyber Attacks Targeting Internet Facing IoT : An Experimental EvaluationSubjects: Cryptography and Security (cs.CR)
- [37] arXiv:2201.02563 [pdf, ps, other]
-
Title: Security Considerations for Virtual Reality SystemsSubjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [38] arXiv:2201.02601 [pdf, other]
-
Title: Apples and Cars: a Comparison of SecurityAuthors: Zhendong MaComments: Extended Abstract, 5th ACM COMPUTER SCIENCE IN CARS SYMPOSIUM (CSCS 2021)Subjects: Cryptography and Security (cs.CR)
- [39] arXiv:2201.02665 [pdf, other]
-
Title: Detecting CAN Masquerade Attacks with Signal Clustering SimilarityComments: 8 pages, 5 figures, 3 tablesJournal-ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
- [40] arXiv:2201.02677 [pdf, other]
-
Title: Predicting sensitive information leakage in IoT applications using flows-aware machine learning approachSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [41] arXiv:2201.02730 [pdf, ps, other]
-
Title: AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [42] arXiv:2201.02775 [pdf, other]
-
Title: ADI: Adversarial Dominating Inputs in Vertical Federated Learning SystemsSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
- [43] arXiv:2201.02866 [pdf, ps, other]
-
Title: Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication FormulaComments: Author's version accepted for DTIS-2019; the final publication is available at this https URL arXiv admin note: text overlap with arXiv:2201.02868Subjects: Cryptography and Security (cs.CR)
- [44] arXiv:2201.02868 [pdf, ps, other]
-
Title: Horizontal Attacks against ECC: from Simulations to ASICComments: Author's version accepted for IOSEC 2019; the final publication is available at Springer via this https URL arXiv admin note: text overlap with arXiv:2201.02866Subjects: Cryptography and Security (cs.CR)
- [45] arXiv:2201.02949 [pdf, other]
-
Title: Video Source Characterization Using Encoding and Encapsulation CharacteristicsSubjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [46] arXiv:2201.02986 [pdf, other]
-
Title: A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAMAuthors: Zhi Zhang, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang XiangSubjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [47] arXiv:2201.03010 [pdf, other]
-
Title: Differentially Private Release of Event Logs for Process MiningComments: arXiv admin note: text overlap with arXiv:2103.11739Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [48] arXiv:2201.03027 [pdf, ps, other]
-
Title: Meta-Generalization for Multiparty Privacy Learning to Identify Anomaly Multimedia Traffic in GraynetComments: Correct some typosSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
- [49] arXiv:2201.03134 [pdf, other]
-
Title: An Interpretable Federated Learning-based Network Intrusion Detection FrameworkComments: 12 pages, draftSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [50] arXiv:2201.03135 [pdf, other]
-
Title: The SEED Internet Emulator and Its Applications in Cybersecurity EducationSubjects: Cryptography and Security (cs.CR)
- [51] arXiv:2201.03281 [pdf, ps, other]
-
Title: IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device IdentificationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [52] arXiv:2201.03388 [pdf, ps, other]
-
Title: A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land bordersSubjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
- [53] arXiv:2201.03391 [pdf, ps, other]
-
Title: Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption StandardSubjects: Cryptography and Security (cs.CR)
- [54] arXiv:2201.03401 [pdf, other]
-
Title: An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILESubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [55] arXiv:2201.03499 [pdf, ps, other]
-
Title: Deletion-Compliance in the Absence of PrivacyComments: 25 pages, 4 figures. Appears in the proceedings of PST2021Subjects: Cryptography and Security (cs.CR)
- [56] arXiv:2201.03767 [pdf, ps, other]
-
Title: Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block CiphersJournal-ref: The Computer Journal 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [57] arXiv:2201.03772 [pdf, other]
-
Title: RFLBAT: A Robust Federated Learning Algorithm against Backdoor AttackSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [58] arXiv:2201.03913 [src]
-
Title: Exponential Randomized Response: Boosting Utility in Differentially Private SelectionComments: This algorithm only works under an assumption that is not realistic for the wider application of differential privacySubjects: Cryptography and Security (cs.CR)
- [59] arXiv:2201.04014 [pdf, other]
-
Title: Captcha Attack: Turning Captchas Against HumanityComments: Currently under submissionSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
- [60] arXiv:2201.04018 [pdf, other]
-
Title: Feature Space Hijacking Attacks against Differentially Private Split LearningComments: To appear at the Third AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-22). (4 pages, short paper.)Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [61] arXiv:2201.04048 [pdf, other]
-
Title: SnapFuzz: An Efficient Fuzzing Framework for Network ApplicationsJournal-ref: ISSTA 22, July 18 22, 2022, Virtual, South KoreaSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [62] arXiv:2201.04211 [pdf, ps, other]
-
Title: Reducing Noise Level in Differential Privacy through Matrix MaskingComments: 31 pagesSubjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
- [63] arXiv:2201.04255 [pdf, other]
-
Title: Rache: Radix-additive caching for homomorphic encryptionAuthors: Dongfang ZhaoSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [64] arXiv:2201.04351 [pdf, other]
-
Title: Diffix Elm: Simple DiffixAuthors: Paul Francis, Sebastian Probst-Eide, David Wagner, Felix Bauer, Cristian Berneanu, Edon GashiSubjects: Cryptography and Security (cs.CR)
- [65] arXiv:2201.04424 [pdf, other]
-
Title: Detecting Ransomware Execution in a Timely MannerComments: 12 Pages, 9 FiguresSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [66] arXiv:2201.04425 [pdf, ps, other]
-
Title: Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV SwarmsComments: 6 pages, 1 figureJournal-ref: 2021 10th MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, p. 81-86Subjects: Cryptography and Security (cs.CR)
- [67] arXiv:2201.04441 [pdf, other]
-
Title: Path Transitions Tell More:Optimizing Fuzzing Schedules via Runtime Program StatesSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [68] arXiv:2201.04569 [pdf, other]
-
Title: Get your Foes Fooled: Proximal Gradient Split Learning for Defense against Model Inversion Attacks on IoMT dataAuthors: Sunder Ali Khowaja, Ik Hyun Lee, Kapal Dev, Muhammad Aslam Jarwar, Nawab Muhammad Faseeh QureshiComments: 10 pages, 5 figures, 2 tablesJournal-ref: IEEE Transactions on Network Science and Engineering, 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
- [69] arXiv:2201.04610 [pdf, other]
-
Title: Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World AttacksSubjects: Cryptography and Security (cs.CR)
- [70] arXiv:2201.04677 [pdf, other]
-
Title: When Machine Learning Meets Spectrum Sharing Security: Methodologies and ChallengesSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
- [71] arXiv:2201.04736 [pdf, other]
-
Title: Security for Machine Learning-based Software Systems: a survey of threats, practices and challengesComments: Accepted at ACM Computing SurveysSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [72] arXiv:2201.04762 [pdf, ps, other]
-
Title: Privacy Amplification by Subsampling in Time DomainSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [73] arXiv:2201.04782 [pdf, other]
-
Title: Privacy-Utility Trades in Crowdsourced Signal Map ObfuscationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [74] arXiv:2201.04803 [pdf, other]
-
Title: A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular NetworksComments: 29 Pages, 5 Figures, Submitted in IEEE Communications Surveys and TutorialsSubjects: Cryptography and Security (cs.CR)
- [75] arXiv:2201.04816 [pdf, other]
-
Title: Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform (EMCP)Authors: Hendrik F. R. Schmidt (1), Jörg Schlötterer (1, 2, 3), Marcel Bargull (1), Enrico Nasca (1, 3), Ryan Aydelott (1), Christin Seifert (1, 2, 3), Folker Meyer (1, 2) ((1) Institute for Artificial Intelligence in Medicine, University Hospital Essen, Essen, Germany (2) University of Duisburg-Essen, Essen, Germany (3) Cancer Research Center Cologne Essen (CCCE), Essen, Germany)Comments: 9 pages, 5 figures, to be published in the proceedings of the 2021 IEEE CogMI conference. Christin Seifert and Folker Meyer are co-senior authorsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [76] arXiv:2201.04845 [pdf, other]
-
Title: Reconstructing Training Data with Informed AdversariesComments: Published at "2022 IEEE Symposium on Security and Privacy (SP)"Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [77] arXiv:2201.04853 [pdf, ps, other]
-
Title: FuzzingDriver: the Missing Dictionary to Increase Code Coverage in FuzzersComments: 29th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022Subjects: Cryptography and Security (cs.CR)
- [78] arXiv:2201.05001 [pdf, ps, other]
-
Title: Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement AnalysisAuthors: Rui WangSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [79] arXiv:2201.05006 [pdf, ps, other]
-
Title: Dynamic Local Searchable Symmetric EncryptionSubjects: Cryptography and Security (cs.CR)
- [80] arXiv:2201.05071 [pdf, other]
-
Title: Evaluation of Neural Networks Defenses and Attacks using NDCG and Reciprocal Rank MetricsComments: 12 pages, 5 figuresJournal-ref: International Journal of Information Security 2022Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
- [81] arXiv:2201.05073 [pdf, ps, other]
-
Title: Low-latency, Scalable, DeFi with ZefSubjects: Cryptography and Security (cs.CR)
- [82] arXiv:2201.05199 [pdf, other]
-
Title: D-Box: DMA-enabled Compartmentalization for Embedded ApplicationsComments: Network and Distributed Systems Security (NDSS) Symposium 2022Subjects: Cryptography and Security (cs.CR)
- [83] arXiv:2201.05326 [pdf, other]
-
Title: Security Orchestration, Automation, and Response Engine for Deployment of Behavioural HoneypotsComments: SOAR Engine for Honeypots Deployment, 8 pages, 7 figuresJournal-ref: 2022 IEEE Conference on Dependable and Secure Computing (DSC)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [84] arXiv:2201.05399 [pdf, other]
-
Title: Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with AndroidSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [85] arXiv:2201.05403 [pdf, ps, other]
-
Title: Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding ProblemSubjects: Cryptography and Security (cs.CR)
- [86] arXiv:2201.05410 [pdf, other]
-
Title: CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum SensorsAuthors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard StillerSubjects: Cryptography and Security (cs.CR)
- [87] arXiv:2201.05415 [pdf, other]
-
Title: Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0Comments: 30 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [88] arXiv:2201.05657 [pdf, other]
-
Title: Authentication and Handover Challenges and Methods for Drone SwarmsComments: Accepted for publication in IEEE Journal of Radio Frequency IdentificationJournal-ref: IEEE Journal of Radio Frequency Identification 2022Subjects: Cryptography and Security (cs.CR)
- [89] arXiv:2201.05671 [pdf, other]
-
Title: Zef: Low-latency, Scalable, Private PaymentsSubjects: Cryptography and Security (cs.CR)
- [90] arXiv:2201.05677 [pdf, other]
-
Title: Bullshark: DAG BFT Protocols Made PracticalSubjects: Cryptography and Security (cs.CR)
- [91] arXiv:2201.05757 [pdf, other]
-
Title: TRacer: Scalable Graph-based Transaction Tracing for Account-based Blockchain Trading SystemsSubjects: Cryptography and Security (cs.CR)
- [92] arXiv:2201.05889 [pdf, other]
-
Title: StolenEncoder: Stealing Pre-trained Encoders in Self-supervised LearningComments: To appear in ACM Conference on Computer and Communications Security (CCS), 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [93] arXiv:2201.05931 [pdf, other]
-
Title: On eliminating blocking interference of RFID unauthorized reader detection systemComments: 4 pages,7 figuresSubjects: Cryptography and Security (cs.CR)
- [94] arXiv:2201.05943 [pdf, other]
-
Title: TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal AttacksComments: Accepted at Design, Automation and Test in Europe Conference (DATE), 2022Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
- [95] arXiv:2201.05964 [pdf, other]
-
Title: Visualizing Privacy-Utility Trade-Offs in Differentially Private Data ReleasesComments: Forthcoming in Proceedings on Privacy Enhancing Technologies 2022Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
- [96] arXiv:2201.05996 [pdf, ps, other]
-
Title: Hardware Implementation of Multimodal Biometric using Fingerprint and IrisAuthors: Tariq M KhanSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [97] arXiv:2201.06038 [pdf, other]
-
Title: Image data hiding with multi-scale autoencoder networkComments: accepted by Media Watermarking, Security, and Forensics 2022Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [98] arXiv:2201.06068 [pdf, ps, other]
-
Title: Zero Botnets: An Observe-Pursue-Counter ApproachAuthors: Jeremy Kepner, Jonathan Bernays, Stephen Buckley, Kenjiro Cho, Cary Conrad, Leslie Daigle, Keeley Erhardt, Vijay Gadepally, Barry Greene, Michael Jones, Robert Knake, Bruce Maggs, Peter Michaleas, Chad Meiners, Andrew Morris, Alex Pentland, Sandeep Pisharody, Sarah Powazek, Andrew Prout, Philip Reiner, Koichi Suzuki, Kenji Takahashi, Tony Tauber, Leah Walker, Douglas StetsonComments: 26 pages, 13 figures, 2 tables, 72 references, submitted to PlosOneSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
- [99] arXiv:2201.06080 [pdf, other]
-
Title: Evaluating the Security of Open Radio Access NetworksAuthors: Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf ShabtaiSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [100] arXiv:2201.06093 [pdf, other]
-
Title: Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)Authors: Edan Habler, Ron Bitton, Dan Avraham, Dudu Mimran, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf ShabtaiSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ showing 100 entries per page: fewer | more | all ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, 2404, contact, help (Access key information)