We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2022, skipping first 125

[ total of 443 entries: 1-25 | ... | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | ... | 426-443 ]
[ showing 25 entries per page: fewer | more | all ]
[126]  arXiv:2208.06165 [pdf, other]
Title: Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots
Authors: Chintan Patel
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[127]  arXiv:2208.06223 [pdf, ps, other]
Title: Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Comments: 56 pages, 11 figures. arXiv admin note: text overlap with arXiv:2201.12194
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[128]  arXiv:2208.06231 [pdf, other]
Title: Mutual authentication in self-organized VANETs
Journal-ref: Computer Standards & Interfaces 36 (4), 704-710, 2014
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2208.06481 [pdf, other]
Title: PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data
Comments: Accepted for IEEE Symposium on Visualization in Cyber Security, 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[130]  arXiv:2208.06568 [pdf, other]
Title: On the Limitations of Continual Learning for Malware Classification
Comments: 19 pages, 11 figures, and 2 tables, Accepted at the Conference on Lifelong Learning Agents - CoLLAs 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[131]  arXiv:2208.06592 [pdf, other]
Title: Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[132]  arXiv:2208.06593 [pdf, ps, other]
Title: Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems
Comments: arXiv admin note: substantial text overlap with arXiv:2208.06147
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 499-508, 2014
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2208.06594 [pdf, ps, other]
Title: Using identity-based cryptography in mobile applications
Comments: arXiv admin note: substantial text overlap with arXiv:2208.03541
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 527-536, 2014
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2208.06628 [pdf, other]
Title: CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2208.06692 [pdf, other]
Title: BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[136]  arXiv:2208.06722 [pdf, ps, other]
Title: A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2208.06774 [pdf, other]
Title: Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2208.06943 [pdf, other]
Title: GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing
Comments: 9 pages, 8 tables, 3 figures
Journal-ref: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2022, pp. 10-18
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[139]  arXiv:2208.07049 [pdf, other]
Title: Self-Supervised Vision Transformers for Malware Detection
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[140]  arXiv:2208.07060 [pdf, ps, other]
Title: A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2208.07127 [pdf, other]
Title: Deception for Cyber Defence: Challenges and Opportunities
Journal-ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[142]  arXiv:2208.07189 [pdf, other]
Title: DHSA: Efficient Doubly Homomorphic Secure Aggregation for Cross-silo Federated Learning
Comments: 34 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2208.07310 [pdf, other]
Title: Placement Laundering and the Complexities of Attribution in Online Advertising
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[144]  arXiv:2208.07476 [pdf, other]
Title: CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[145]  arXiv:2208.07489 [pdf, other]
Title: Single Round-trip Hierarchical ORAM via Succinct Indices
Comments: 22 pages, 3 Figures, 5 Tables
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2208.07556 [pdf, other]
Title: pyCANON: A Python library to check the level of anonymity of a dataset
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[147]  arXiv:2208.07570 [pdf, other]
Title: Inhale: Enabling High-Performance and Energy-Efficient In-SRAM Cryptographic Hash for IoT
Comments: 9 pages, ICCAD 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[148]  arXiv:2208.07604 [pdf, ps, other]
Title: Achieve Fully Decentralized End to End Encryption Meeting via Blockchain
Authors: Yang, Tan
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:2208.07700 [pdf, other]
Title: Secure system based on UAV and BLE for improving SAR missions
Journal-ref: Journal of Ambient Intelligence and Humanized Computing 11(8) pp. 3109-3120. 2020
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2208.07701 [pdf, other]
Title: Using blockchain in the follow-up of emergency situations related to events
Journal-ref: Software: Practice and Experience 51(10) pp. 2000-2014. 2021
Subjects: Cryptography and Security (cs.CR)
[ total of 443 entries: 1-25 | ... | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | ... | 426-443 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)