We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2022, skipping first 110

[ total of 443 entries: 1-10 | ... | 81-90 | 91-100 | 101-110 | 111-120 | 121-130 | 131-140 | 141-150 | ... | 441-443 ]
[ showing 10 entries per page: fewer | more | all ]
[111]  arXiv:2208.05707 [pdf, other]
Title: Improving Tourist Experience Through an IoT Application Based on FatBeacons
Journal-ref: International Conference on Ubiquitous Computing and Ambient Intelligence, pp. 149-160, 2017
Subjects: Cryptography and Security (cs.CR)
[112]  arXiv:2208.05734 [pdf, other]
Title: Secure ambient intelligence prototype for airports
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2208.05748 [pdf, other]
Title: Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work Mining
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2208.05750 [pdf, other]
Title: A Survey of MulVAL Extensions and Their Attack Scenarios Coverage
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2208.05865 [pdf, ps, other]
Title: Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms
Comments: 12 pages, 13 eps figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[116]  arXiv:2208.05895 [pdf, other]
Title: Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2208.05922 [pdf, other]
Title: Privacy Preservation Among Honest-but-Curious Edge Nodes: A Survey
Comments: 12 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[118]  arXiv:2208.06002 [pdf, other]
Title: A review of cryptosystems based on multi layer chaotic mappings
Comments: 10 pages, 1 figure, 3 tables
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2208.06003 [pdf, ps, other]
Title: Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
Comments: IEEE Access, early published by July 14, 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[120]  arXiv:2208.06075 [pdf, other]
Title: Testing SOAR Tools in Use
Journal-ref: Computers & Security 2023
Subjects: Cryptography and Security (cs.CR)
[ total of 443 entries: 1-10 | ... | 81-90 | 91-100 | 101-110 | 111-120 | 121-130 | 131-140 | 141-150 | ... | 441-443 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)