We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2022, skipping first 75

[ total of 443 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 426-443 ]
[ showing 25 entries per page: fewer | more | all ]
[76]  arXiv:2208.03884 [pdf, ps, other]
Title: Differential biases, $c$-differential uniformity, and their relation to differential attacks
Comments: 14 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[77]  arXiv:2208.03909 [pdf, other]
Title: Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2208.03944 [pdf, other]
Title: Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering
Comments: this https URL&hl=en
Journal-ref: IEEE Transactions on Dependable and Secure Computing (Final version at IEEE, 2024)
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2208.03951 [pdf, ps, other]
Title: Simplifying Electronic Document Digital Signatures
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2208.04591 [pdf, other]
Title: Stronger Privacy Amplification by Shuffling for Rényi and Approximate Differential Privacy
Comments: Errata added. 14 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[81]  arXiv:2208.04624 [pdf, other]
Title: Bottom-up Trust Registry in Self Sovereign Identity
Comments: 10 pages, published in Blockchain Congress Conference 2022
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2208.04676 [pdf, ps, other]
Title: DeepHider: A Covert NLP Watermarking Framework Based on Multi-task Learning
Comments: 16 pages,10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[83]  arXiv:2208.04719 [pdf, other]
Title: STELLA: Sparse Taint Analysis for Enclave Leakage Detection
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[84]  arXiv:2208.04734 [pdf, other]
Title: Weak Equivalents for Nonlinear Filtering Functions
Journal-ref: International Conference on Computational Science and Its Applications, pp. 592-602, 2014
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2208.04838 [pdf, ps, other]
Title: Robust Machine Learning for Malware Detection over Time
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2208.04891 [pdf, other]
Title: Online Malware Classification with System-Wide System Calls in Cloud IaaS
Comments: Accepted at the IEEE 23rd International Conference on Information Reuse and Integration for Data Science
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.04991 [pdf, other]
Title: Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Networking and Internet Architecture (cs.NI)
[88]  arXiv:2208.04999 [pdf, other]
Title: Measuring the Availability and Response Times of Public Encrypted DNS Resolvers
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2208.05073 [pdf, ps, other]
Title: Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 2 Figures, 4 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[90]  arXiv:2208.05085 [pdf, ps, other]
Title: Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 3 figures 4 tables
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2208.05089 [pdf, ps, other]
Title: Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, g figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2208.05101 [pdf, ps, other]
Title: Machine Learning with DBOS
Comments: AIDB@VLDB 2022
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[93]  arXiv:2208.05109 [pdf, other]
Title: Tamperproof IoT with Blockchain
Comments: 3 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2208.05125 [pdf, other]
Title: Cross-chain between a Parent Chain and Multiple Side Chains
Comments: 14 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2208.05168 [pdf, other]
Title: TokenPatronus: A Decentralized NFT Anti-theft Mechanism
Comments: submitted to CESC 2022 as a work-in-progress paper
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2208.05285 [pdf, other]
Title: Explaining Machine Learning DGA Detectors from DNS Traffic Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2208.05343 [pdf, ps, other]
Title: Using query frequencies in tree-based revocation for certificateless authentication in VANETs
Journal-ref: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), pp. 268-273, 2014
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2208.05345 [pdf, ps, other]
Title: RFID authentication protocol based on a novel EPC Gen2 PRNG
Journal-ref: International Information Institute (Tokyo). Information 17 (4), 1587, 2014
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2208.05346 [pdf, ps, other]
Title: Analysis of lightweight cryptographic solutions for authentication in IoT
Journal-ref: International Conference on Computer Aided Systems Theory, 373-380, 2013
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2208.05408 [pdf, other]
Title: Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot
Comments: To appear at ConsensusDay 22 (ACM CCS 2022 Workshop)
Subjects: Cryptography and Security (cs.CR)
[ total of 443 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 426-443 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)