We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2022, skipping first 25

[ total of 435 entries: 1-10 | 6-15 | 16-25 | 26-35 | 36-45 | 46-55 | 56-65 | ... | 426-435 ]
[ showing 10 entries per page: fewer | more | all ]
[26]  arXiv:2210.01749 [pdf, other]
Title: Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Comments: arXiv admin note: text overlap with arXiv:2206.01314
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2210.01778 [pdf, other]
Title: Semantics-based Privacy by Design for Internet of Things Applications
Journal-ref: Future Generation Computer Systems, Volume 138, January 2023, Pages 280-295
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[28]  arXiv:2210.01853 [pdf, other]
Title: Privacy-Patterns for IoT Application Developers
Comments: In Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp/ISWC '22)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29]  arXiv:2210.01988 [pdf, ps, other]
Title: Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning
Comments: Accepted at 44th IEEE Symposium on Security and Privacy (S&P 2023)
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2210.02143 [pdf, other]
Title: Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2210.02161 [pdf, ps, other]
Title: Security and Privacy Concerns in Cloud-based Scientific and Business Workflows: A Systematic Review
Comments: 16 pages, 8 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[32]  arXiv:2210.02234 [pdf, other]
Title: Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input
Comments: arXiv admin note: substantial text overlap with arXiv:1806.10189
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33]  arXiv:2210.02257 [pdf, other]
Title: Hiding Images in Deep Probabilistic Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Multimedia (cs.MM)
[34]  arXiv:2210.02337 [pdf, other]
Title: When Physical Layer Key Generation Meets RIS: Opportunities, Challenges, and Road Ahead
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2210.02360 [pdf, other]
Title: DiPPS: Differentially Private Propensity Scores for Bias Correction
Comments: 11 pages, 2 figures. Current version: conference version
Journal-ref: Proceedings of the Seventeenth International AAAI Conference on Web and Social Media (2023) 114-125
Subjects: Cryptography and Security (cs.CR)
[ total of 435 entries: 1-10 | 6-15 | 16-25 | 26-35 | 36-45 | 46-55 | 56-65 | ... | 426-435 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)