We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2022, skipping first 25

[ total of 443 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 426-443 ]
[ showing 25 entries per page: fewer | more | all ]
[26]  arXiv:2208.01634 [pdf, ps, other]
Title: Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2208.01635 [pdf, ps, other]
Title: Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, Volume 21, No 2
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 2, pages 71-88
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2208.01636 [pdf, ps, other]
Title: A Roadmap for Greater Public Use of Privacy-Sensitive Government Data: Workshop Report
Comments: 23 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (cs.LG)
[29]  arXiv:2208.01639 [pdf, ps, other]
Title: Sharpening Your Tools: Updating bulk_extractor for the 2020s
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2208.01700 [pdf, other]
Title: Differentially Private Vertical Federated Clustering
Journal-ref: PVLDB, 16(6): 1277 - 1290, 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2208.01703 [pdf, other]
Title: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[32]  arXiv:2208.01826 [pdf, ps, other]
Title: A New Implementation of Federated Learning for Privacy and Security Enhancement
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33]  arXiv:2208.01886 [pdf, other]
Title: Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2208.01908 [pdf, other]
Title: Mass Exit Attacks on the Lightning Network
Journal-ref: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[35]  arXiv:2208.01919 [pdf, other]
Title: Spectrum Focused Frequency Adversarial Attacks for Automatic Modulation Classification
Authors: Sicheng Zhang (1), Jiarun Yu (1), Zhida Bao (1), Shiwen Mao (2), Yun Lin (1) ((1) College of Information and Communication Engineering, Harbin Engineering University, Harbin, (2) Department of Electrical & Computer Engineering, Auburn University, Auburn)
Comments: 6 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[36]  arXiv:2208.01968 [pdf, other]
Title: Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[37]  arXiv:2208.02093 [pdf, other]
Title: Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2208.02094 [pdf, ps, other]
Title: A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[39]  arXiv:2208.02125 [pdf, other]
Title: Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Comments: Submitted to IEEE TIFS and currently under review
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2208.02159 [pdf, other]
Title: CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[41]  arXiv:2208.02160 [pdf, ps, other]
Title: Scrypt Mining with ASICs
Authors: David Watkins
Comments: Published in 2014
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2208.02201 [pdf, other]
Title: Statistical Decoding 2.0: Reducing Decoding to LPN
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2208.02244 [pdf, other]
Title: Contrasting global approaches for identifying and managing cybersecurity risks in supply chains
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[44]  arXiv:2208.02310 [pdf, other]
Title: Design of secure and robust cognitive system for malware detection
Authors: Sanket Shukla
Comments: arXiv admin note: substantial text overlap with arXiv:2104.06652
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2208.02500 [pdf, other]
Title: "Yeah, it does have a...Windows `98 Vibe'': Usability Study of Security Features in Programmable Logic Controllers
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC); Systems and Control (eess.SY)
[46]  arXiv:2208.02592 [pdf, other]
Title: Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[47]  arXiv:2208.02615 [pdf, other]
Title: SROS2: Usable Cyber Security Tools for ROS 2
Comments: Accepted, IROS 2022, 7 pages, 2 figures, 5 code listings, 5 sections plus references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Robotics (cs.RO); Software Engineering (cs.SE)
[48]  arXiv:2208.02672 [pdf, other]
Title: Information Flow Control-by-Construction for an Object-Oriented Language Using Type Modifiers
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2208.02699 [pdf, other]
Title: Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Comments: Extended version of a paper accepted at ESORICS 2022
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[50]  arXiv:2208.02733 [pdf, other]
Title: On False Data Injection Attack against Building Automation Systems
Subjects: Cryptography and Security (cs.CR)
[ total of 443 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 426-443 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)