We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 100

[ total of 374 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]
[101]  arXiv:2206.07019 [pdf, other]
Title: An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2206.07164 [pdf, other]
Title: Edge Security: Challenges and Issues
Comments: 21 pages. Survey paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2206.07215 [pdf, other]
Title: SPENDER: A Platform for Secure and Privacy-Preserving Decentralized P2P E-Commerce
Comments: 9 pages, 2 figures, preprint
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[104]  arXiv:2206.07220 [pdf, other]
Title: Towards Verifiable Differentially-Private Polling
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2206.07248 [pdf]
Title: Blockchain based Secure Energy Marketplace Scheme to Motivate P2P Microgrids
Comments: Accepted to be published in the International Journal of Informatics and Communication Technology (IJ-ICT)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[106]  arXiv:2206.07321 [pdf, other]
Title: Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Comments: 13 pages, 6 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2108.13952
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107]  arXiv:2206.07323 [pdf, other]
Title: A Continuous Risk Assessment Methodology for Cloud Infrastructures
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2206.07329 [pdf, ps, other]
Title: Application-Oriented Selection of Privacy Enhancing Technologies
Journal-ref: Annual Privacy Forum. Springer, Cham, 2022. S. 75-87
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2206.07418 [pdf, other]
Title: Designing a Provenance Analysis for SGX Enclaves
Comments: 16 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2206.07429 [pdf, other]
Title: Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting
Comments: 34 pages, 5 figures
Journal-ref: SN COMPUT. SCI. 3, 334 (2022)
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2206.07507 [pdf, other]
Title: YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
Comments: This paper was published in the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria, ACM
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[112]  arXiv:2206.07581 [pdf]
Title: Learn to Adapt: Robust Drift Detection in Security Domain
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2206.07895 [pdf, other]
Title: Dual-channel Early Warning Framework for Ethereum Ponzi Schemes
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2206.07910 [pdf, ps, other]
Title: Introducing the Huber mechanism for differentially private low-rank matrix completion
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[115]  arXiv:2206.07998 [pdf, other]
Title: Differentially Private Multi-Party Data Release for Linear Regression
Comments: UAI 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116]  arXiv:2206.08004 [pdf, other]
Title: When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117]  arXiv:2206.08132 [pdf, other]
Title: Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[118]  arXiv:2206.08260 [pdf, other]
Title: Adversarial Robustness of Graph-based Anomaly Detection
Comments: arXiv admin note: substantial text overlap with arXiv:2106.09989
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2206.08396 [pdf, other]
Title: User Customizable and Robust Geo-Indistinguishability for Location Privacy
Comments: Under review
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2206.08565 [pdf, other]
Title: Identifying Counterfeit Products using Blockchain Technology in Supply Chain System
Comments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)
Journal-ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2206.08722 [pdf, other]
Title: WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: ICDCS'22: Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, July 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[122]  arXiv:2206.08821 [pdf, other]
Title: Exploring Web3 From the View of Blockchain
Comments: Tech Report 2022
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2206.09009 [pdf, other]
Title: Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Comments: Accepted at IEEE Network Magazine, 8 pages. arXiv admin note: substantial text overlap with arXiv:2109.14263
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[124]  arXiv:2206.09011 [pdf, other]
Title: Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks
Comments: 12 pages, 12 figures, 13 equations
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2206.09122 [pdf, other]
Title: Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[ total of 374 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2302, contact, help  (Access key information)