We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 100

[ total of 375 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | ... | 351-375 ]
[ showing 50 entries per page: fewer | more | all ]
[101]  arXiv:2206.07019 [pdf, other]
Title: An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2206.07164 [pdf, other]
Title: Edge Security: Challenges and Issues
Comments: 21 pages. Survey paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2206.07215 [pdf, other]
Title: SPENDER: A Platform for Secure and Privacy-Preserving Decentralized P2P E-Commerce
Comments: 9 pages, 2 figures, preprint
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[104]  arXiv:2206.07220 [pdf, other]
Title: Towards Verifiable Differentially-Private Polling
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2206.07248 [pdf, ps, other]
Title: Blockchain based Secure Energy Marketplace Scheme to Motivate P2P Microgrids
Journal-ref: International Journal of Informatics and Communication Technology 11, 177-184 (2022)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[106]  arXiv:2206.07321 [pdf, other]
Title: Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Comments: 13 pages, 6 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2108.13952
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107]  arXiv:2206.07323 [pdf, other]
Title: A Continuous Risk Assessment Methodology for Cloud Infrastructures
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2206.07329 [pdf, ps, other]
Title: Application-Oriented Selection of Privacy Enhancing Technologies
Journal-ref: Annual Privacy Forum. Springer, Cham, 2022. S. 75-87
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2206.07418 [pdf, other]
Title: Designing a Provenance Analysis for SGX Enclaves
Comments: 16 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2206.07429 [pdf, other]
Title: Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting
Comments: 34 pages, 5 figures
Journal-ref: SN COMPUT. SCI. 3, 334 (2022)
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2206.07507 [pdf, other]
Title: YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
Comments: This paper was published in the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria, ACM
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[112]  arXiv:2206.07581 [pdf, ps, other]
Title: Learn to Adapt: Robust Drift Detection in Security Domain
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2206.07895 [pdf, other]
Title: Dual-channel Early Warning Framework for Ethereum Ponzi Schemes
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2206.07910 [pdf, ps, other]
Title: Introducing the Huber mechanism for differentially private low-rank matrix completion
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[115]  arXiv:2206.07998 [pdf, other]
Title: Differentially Private Multi-Party Data Release for Linear Regression
Comments: UAI 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116]  arXiv:2206.08004 [pdf, other]
Title: When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117]  arXiv:2206.08132 [pdf, other]
Title: Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[118]  arXiv:2206.08260 [pdf, other]
Title: From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection
Comments: arXiv admin note: substantial text overlap with arXiv:2106.09989
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2206.08396 [pdf, other]
Title: User Customizable and Robust Geo-Indistinguishability for Location Privacy
Comments: Under review
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2206.08565 [pdf, other]
Title: Identifying Counterfeit Products using Blockchain Technology in Supply Chain System
Comments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)
Journal-ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2206.08722 [pdf, other]
Title: WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: ICDCS'22: Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, July 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[122]  arXiv:2206.08821 [pdf, other]
Title: Exploring Web3 From the View of Blockchain
Comments: Tech Report 2022
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2206.09009 [pdf, other]
Title: Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Comments: Accepted at IEEE Network Magazine, 8 pages. arXiv admin note: substantial text overlap with arXiv:2109.14263
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[124]  arXiv:2206.09011 [pdf, other]
Title: Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks
Comments: 12 pages, 12 figures, 13 equations
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2206.09122 [pdf, other]
Title: Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2206.09133 [pdf, other]
Title: Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers
Comments: 10 pages,
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[127]  arXiv:2206.09237 [pdf, other]
Title: Systematic Analysis and Comparison of Security Advice as Datasets
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2206.09272 [pdf, other]
Title: DECK: Model Hardening for Defending Pervasive Backdoors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[129]  arXiv:2206.09388 [pdf, other]
Title: Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition
Comments: Accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE)
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2206.09424 [pdf, ps, other]
Title: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Comments: 15 pages, 3 figuers, Journal Paper
Journal-ref: Computers, Materials & Continua, 2022
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2206.09428 [pdf, ps, other]
Title: Reputation, Risk, and Trust on User Adoption of Internet Search Engines: The Case of DuckDuckGo
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[132]  arXiv:2206.09519 [pdf, other]
Title: Walking to Hide: Privacy Amplification via Random Message Exchanges in Network
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2206.09569 [pdf, other]
Title: Shuffle Gaussian Mechanism for Differential Privacy
Comments: Fixed typos. The source code of our implementation is available at this http URL . arXiv admin note: text overlap with arXiv:2206.03151
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[134]  arXiv:2206.09707 [pdf, other]
Title: The Role of Machine Learning in Cybersecurity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2206.09834 [pdf, ps, other]
Title: The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2206.09870 [pdf, other]
Title: Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2206.10050 [pdf, ps, other]
Title: Better Incentives for Proof-of-Work
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2206.10112 [pdf, other]
Title: General Framework for Reversible Data Hiding in Texts Based on Masked Language Modeling
Comments: this https URL&hl=en
Journal-ref: IEEE International Workshop on Multimedia Signal Processing (2022)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[139]  arXiv:2206.10272 [pdf, other]
Title: Identification of Attack Paths Using Kill Chain and Attack Graphs
Comments: IEEE/IFIP NOMS 2022 conference, 6 pages
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2206.10334 [pdf, other]
Title: Defending Adversarial Examples by Negative Correlation Ensemble
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[141]  arXiv:2206.10341 [pdf, other]
Title: Neurotoxin: Durable Backdoors in Federated Learning
Comments: Appears in ICML 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[142]  arXiv:2206.10368 [pdf, other]
Title: Real-Time Waveform Matching with a Digitizer at 10 GS/s
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[143]  arXiv:2206.10379 [pdf, other]
Title: Can process mining help in anomaly-based intrusion detection?
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2206.10400 [pdf, other]
Title: Using EBGAN for Anomaly Intrusion Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[145]  arXiv:2206.10413 [pdf, other]
Title: Multilayer Block Models for Exploratory Analysis of Computer Event Logs
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[146]  arXiv:2206.10473 [pdf, ps, other]
Title: Securing the Future Internet of Things with Post-Quantum Cryptography
Comments: Accepted version
Journal-ref: Security and Privacy 5 (2), e20, 2022
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2206.10525 [pdf, other]
Title: PRIVIC: A privacy-preserving method for incremental collection of location data
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR)
[148]  arXiv:2206.10685 [pdf, other]
Title: Differentially Private Maximal Information Coefficients
Comments: 38 pages, to appear in ICML 2022
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Methodology (stat.ME)
[149]  arXiv:2206.10746 [pdf, ps, other]
Title: A Practical Methodology for ML-Based EM Side Channel Disassemblers
Comments: Accepted to the poster section of the 7th IEEE European Symposium on Security and Privacy 2022
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2206.10753 [pdf, other]
Title: Secure and Efficient Query Processing in Outsourced Databases
Authors: Dmytro Bogatov
Comments: Ph.D. thesis
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[ total of 375 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | ... | 351-375 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)