We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 75

[ total of 374 entries: 1-10 | ... | 46-55 | 56-65 | 66-75 | 76-85 | 86-95 | 96-105 | 106-115 | ... | 366-374 ]
[ showing 10 entries per page: fewer | more | all ]
[76]  arXiv:2206.04911 [pdf, ps, other]
Title: NSSIA: A New Self-Sovereign Identity Scheme with Accountability
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2206.04947 [pdf, other]
Title: Semantic Technology based Usage Control for Decentralized Systems
Authors: Ines Akaichi
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Logic in Computer Science (cs.LO); Systems and Control (eess.SY)
[78]  arXiv:2206.05091 [pdf, other]
Title: Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[79]  arXiv:2206.05276 [pdf, other]
Title: Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion
Authors: Yinan Hu, Quanyan Zhu
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); Systems and Control (eess.SY)
[80]  arXiv:2206.05359 [pdf, other]
Title: Blades: A Simulator for Attacks and Defenses in Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[81]  arXiv:2206.05438 [pdf, other]
Title: Guaranteeing Timed Opacity using Parametric Timed Model Checking
Comments: This is the author version of the manuscript of the same name published in ACM Transactions on Software Engineering and Methodology (ToSEM). This work is partially supported by the ANR national research program PACS (ANR-14-CE28-0002), by the ANR-NRF research program ProMiS (ANR-19-CE25-0015), and by ERATO HASUO Metamathematics for Systems Design Project (No. JPMJER1603), JST. arXiv admin note: substantial text overlap with arXiv:1907.00537
Journal-ref: ACM Transactions on Software Engineering and Methodology (ToSEM), Volume 31(4), 2022
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[82]  arXiv:2206.05565 [pdf, other]
Title: NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks
Journal-ref: Annual Computer Security Applications Conference (ACSAC '22), December 5--9, 2022, Austin, TX, USA
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[83]  arXiv:2206.05679 [pdf, other]
Title: Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2206.05735 [pdf, other]
Title: Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2206.05821 [pdf, other]
Title: RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis
Comments: This extended abstract is 2 pages containing 2 Figures. This abstract was presented at the 2022 Non-Volatile Memories Workshop (NVMW'22) and the full paper was published at ASPLOS 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[ total of 374 entries: 1-10 | ... | 46-55 | 56-65 | 66-75 | 76-85 | 86-95 | 96-105 | 106-115 | ... | 366-374 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2301, contact, help  (Access key information)