We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2022, skipping first 80

[ total of 443 entries: 1-25 | 6-30 | 31-55 | 56-80 | 81-105 | 106-130 | 131-155 | 156-180 | ... | 431-443 ]
[ showing 25 entries per page: fewer | more | all ]
[81]  arXiv:2208.04624 [pdf, other]
Title: Bottom-up Trust Registry in Self Sovereign Identity
Comments: 10 pages, published in Blockchain Congress Conference 2022
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2208.04676 [pdf, ps, other]
Title: DeepHider: A Covert NLP Watermarking Framework Based on Multi-task Learning
Comments: 16 pages,10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[83]  arXiv:2208.04719 [pdf, other]
Title: STELLA: Sparse Taint Analysis for Enclave Leakage Detection
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[84]  arXiv:2208.04734 [pdf, other]
Title: Weak Equivalents for Nonlinear Filtering Functions
Journal-ref: International Conference on Computational Science and Its Applications, pp. 592-602, 2014
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2208.04838 [pdf, ps, other]
Title: Robust Machine Learning for Malware Detection over Time
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2208.04891 [pdf, other]
Title: Online Malware Classification with System-Wide System Calls in Cloud IaaS
Comments: Accepted at the IEEE 23rd International Conference on Information Reuse and Integration for Data Science
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.04991 [pdf, other]
Title: Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Networking and Internet Architecture (cs.NI)
[88]  arXiv:2208.04999 [pdf, other]
Title: Measuring the Availability and Response Times of Public Encrypted DNS Resolvers
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2208.05073 [pdf, ps, other]
Title: Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 2 Figures, 4 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[90]  arXiv:2208.05085 [pdf, ps, other]
Title: Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 3 figures 4 tables
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2208.05089 [pdf, ps, other]
Title: Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, g figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2208.05101 [pdf, ps, other]
Title: Machine Learning with DBOS
Comments: AIDB@VLDB 2022
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[93]  arXiv:2208.05109 [pdf, other]
Title: Tamperproof IoT with Blockchain
Comments: 3 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2208.05125 [pdf, other]
Title: Cross-chain between a Parent Chain and Multiple Side Chains
Comments: 14 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2208.05168 [pdf, other]
Title: TokenPatronus: A Decentralized NFT Anti-theft Mechanism
Comments: submitted to CESC 2022 as a work-in-progress paper
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2208.05285 [pdf, other]
Title: Explaining Machine Learning DGA Detectors from DNS Traffic Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2208.05343 [pdf, ps, other]
Title: Using query frequencies in tree-based revocation for certificateless authentication in VANETs
Journal-ref: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), pp. 268-273, 2014
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2208.05345 [pdf, ps, other]
Title: RFID authentication protocol based on a novel EPC Gen2 PRNG
Journal-ref: International Information Institute (Tokyo). Information 17 (4), 1587, 2014
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2208.05346 [pdf, ps, other]
Title: Analysis of lightweight cryptographic solutions for authentication in IoT
Journal-ref: International Conference on Computer Aided Systems Theory, 373-380, 2013
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2208.05408 [pdf, other]
Title: Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot
Comments: To appear at ConsensusDay 22 (ACM CCS 2022 Workshop)
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2208.05425 [pdf, other]
Title: Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
Comments: This paper is an extended version of a paper accepted to ACM Advances in Financial Techologies - AFT 2022
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2208.05471 [pdf, ps, other]
Title: Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2208.05475 [pdf, ps, other]
Title: Poster: Revocation in VANETs Based on k-ary Huffman Trees
Journal-ref: Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, pp. 25-26, 2015
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2208.05476 [pdf, other]
Title: Sequence Feature Extraction for Malware Family Analysis via Graph Neural Network
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[105]  arXiv:2208.05477 [pdf, other]
Title: Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Comments: 11 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 443 entries: 1-25 | 6-30 | 31-55 | 56-80 | 81-105 | 106-130 | 131-155 | 156-180 | ... | 431-443 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)