We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Feb 2023

[ total of 368 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 351-368 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:2302.00210 [pdf, ps, other]
Title: Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[2]  arXiv:2302.00271 [pdf, other]
Title: CATFL: Certificateless Authentication-based Trustworthy Federated Learning for 6G Semantic Communications
Comments: Accepted by WCNC workshop 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[3]  arXiv:2302.00325 [pdf, ps, other]
Title: Privacy Dashboards for Citizens and corresponding GDPR Services for Small Data Holders: A Literature Review
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[4]  arXiv:2302.00338 [pdf, ps, other]
Title: A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks
Authors: Yousri Daldoul
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[5]  arXiv:2302.00732 [pdf, other]
Title: Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[6]  arXiv:2302.00750 [pdf, ps, other]
Title: Developing Hands-on Labs for Source Code Vulnerability Detection with AI
Authors: Maryam Taeb
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[7]  arXiv:2302.00876 [pdf, other]
Title: Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[8]  arXiv:2302.00947 [pdf, other]
Title: SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[9]  arXiv:2302.01024 [pdf, other]
Title: SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2302.01026 [pdf, ps, other]
Title: Generalized Uncertainty Principles for Quantum Cryptography
Authors: Randy Kuang
Comments: 7 pages, 5 figures, conference invited speech at ICCCAS, then to be published by JCM
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2302.01131 [pdf, other]
Title: An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2302.01177 [pdf, other]
Title: Order but Not Execute in Order
Comments: 14 pages, 31 figures
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[13]  arXiv:2302.01182 [pdf, other]
Title: Blocking JavaScript without Breaking the Web: An Empirical Investigation
Journal-ref: petsymposium 2023
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[14]  arXiv:2302.01215 [pdf, other]
Title: Fixing Hardware Security Bugs with Large Language Models
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2302.01225 [pdf, ps, other]
Title: Asymmetric Cryptosystem Using Careful Synchronization
Authors: Jakub Ruszil
Comments: 17 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2302.01235 [pdf, ps, other]
Title: Printing Protocol: Physical ZKPs for Decomposition Puzzles
Comments: A preliminary version of this paper has appeared at LATINCRYPT 2023
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2302.01336 [pdf, other]
Title: A Framework to Allow a Third Party to Watermark Numerical Data in an Encrypted Domain while Preserving its Statistical Properties
Comments: 70 pages, 16 figures, A minor thesis for the degree of Masters of Computer Science, School of Computing Technologies, STEM College, Royal Melbourne Institute of Technology, University Melbourne, Victoria, Australia. August 2022
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2302.01388 [pdf, other]
Title: Statistical Verification of Traffic Systems with Expected Differential Privacy
Comments: American Control Conference 2023 (ACC23)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY); Computation (stat.CO)
[19]  arXiv:2302.01401 [pdf, ps, other]
Title: A Transcontinental Analysis of Account Remediation Protocols of Popular Websites
Comments: Conference: Symposium on Usable Security and Privacy (USEC) 2023At: San Diego, California
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2302.01452 [pdf, other]
Title: MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime
Comments: 13 pages, full version with material cut from version accepted at ACM WiSec 2023
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2302.01474 [pdf, other]
Title: Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation
Comments: Preprint. Under review
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[22]  arXiv:2302.01584 [pdf, other]
Title: TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[23]  arXiv:2302.01733 [pdf, other]
Title: Committed Private Information Retrieval
Comments: Accepted at ESORICS 2023
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Information Retrieval (cs.IR)
[24]  arXiv:2302.01744 [pdf, other]
Title: Communication Security in the Internet of Vehicles based Industrial Value Chain
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2302.01745 [pdf, other]
Title: Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[ total of 368 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 351-368 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)