We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 90 entries: 1-90 ]
[ showing up to 104 entries per page: fewer | more ]

Tue, 9 Aug 2022

[1]  arXiv:2208.03951 [pdf, ps, other]
Title: Simplifying Electronic Document Digital Signatures
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2208.03944 [pdf, other]
Title: Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering
Comments: this https URL&hl=en
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2208.03909 [pdf, other]
Title: Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2208.03884 [pdf, ps, other]
Title: Differential biases, $c$-differential uniformity, and their relation to differential attacks
Comments: 14 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[5]  arXiv:2208.03862 [pdf, other]
Title: DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic
Authors: Zhi Liu
Comments: visit DeepTLS at this https URL
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2208.03837 [pdf, other]
Title: Automatic Security Assessment of GitHub Actions Workflows
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2208.03822 [pdf, other]
Title: Garbled EDA: Privacy Preserving Electronic Design Automation
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2208.03806 [pdf, other]
Title: HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2208.03784 [pdf, other]
Title: CoVault: A Secure Analytics Platform
Comments: 14 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[10]  arXiv:2208.03781 [pdf, ps, other]
Title: IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2208.03631 [pdf, other]
Title: An Enclave-based TEE for SE-in-SoC in RISC-V Industry
Comments: Invited paper of Embedded World 2020
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[12]  arXiv:2208.03607 [pdf]
Title: Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry
Comments: This is a preprint version of a manuscript accepted in the Journal of Information Warfare. Please cite this paper as: G. Grispos and W.R. Mahoney (2022). Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry. Journal of Information Warfare, Vol. 21 (3), pp. 59-73
Journal-ref: Journal of Information Warfare, Vol. 21 (3), pp. 59-73 (2022)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[13]  arXiv:2208.03541 [pdf]
Title: Strong authentication on smart wireless devices
Journal-ref: Second International Conference on Future Generation Communication Technologies (FGCT 2013), pp. 137-142,
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2208.03528 [pdf, other]
Title: MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2208.03505 [pdf, other]
Title: "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers
Comments: Accepted to appear at USENIX Security 2023
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2208.03484 [pdf, other]
Title: Towards Interdependent Safety Security Assessments using Bowties
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[17]  arXiv:2208.03445 [pdf]
Title: Detecting Algorithmically Generated Domains Using a GCNN-LSTM Hybrid Neural Network
Authors: Zheng Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2208.03412 [pdf, other]
Title: PREPRINT: Can the OpenSSF Scorecard be used to measure the security posture of npm and PyPI?
Comments: 12 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2208.03399 [pdf, other]
Title: LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles
Comments: Accepted and to appear in IEEE GlobeCom 2022; Code is available at Github link: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[20]  arXiv:2208.04135 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Attacks on Image Generation With Made-Up Words
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2208.04061 (cross-list from cs.IT) [pdf, ps, other]
Title: Efficient Description of some Classes of Codes using Group Algebras
Comments: A shortened version was submitted to MTNS 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[22]  arXiv:2208.03948 (cross-list from cs.CV) [pdf, other]
Title: AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Comments: this https URL&hl=en
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[23]  arXiv:2208.03567 (cross-list from cs.LG) [pdf, other]
Title: On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[24]  arXiv:2208.03466 (cross-list from cs.CY) [pdf, ps, other]
Title: Preventing or Mitigating Adversarial Supply Chain Attacks; a legal analysis
Comments: 23 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[25]  arXiv:2208.03409 (cross-list from cs.LG) [pdf, other]
Title: DP$^2$-VAE: Differentially Private Pre-trained Variational Autoencoders
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[26]  arXiv:2208.03392 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning for Medical Applications: A Taxonomy, Current Trends, and Research Challenges
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Mon, 8 Aug 2022

[27]  arXiv:2208.03276 [pdf, other]
Title: Modeling Self-Propagating Malware with Epidemiological Models
Subjects: Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Applications (stat.AP)
[28]  arXiv:2208.03169 [pdf, other]
Title: FBI: Fingerprinting models with Benign Inputs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[29]  arXiv:2208.02999 [pdf, other]
Title: Cryptoeconomic Security for Data Availability Committees
Comments: 35 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2208.02917 [pdf, ps, other]
Title: Padding-only defenses add delay in Tor
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2208.02906 [pdf, other]
Title: Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions
Comments: 8 pages, 7 figures and Supporting Information
Subjects: Cryptography and Security (cs.CR); Applied Physics (physics.app-ph); Optics (physics.optics)
[32]  arXiv:2208.02883 [pdf, other]
Title: Beware of Discarding Used SRAMs: Information is Stored Permanently
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[33]  arXiv:2208.02877 [pdf, other]
Title: A Forward-secure Efficient Two-factor Authentication Protocol
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2208.02858 [pdf, other]
Title: An Empirical Study on Ethereum Private Transactions and the Security Implications
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2208.02857 [pdf, other]
Title: Identity-Based Authentication for On-Demand Charging of Electric Vehicles
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2208.02820 [pdf, other]
Title: MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Comments: 15 pages. The journal extension of our conference paper in AAAI 2022 (this https URL). arXiv admin note: substantial text overlap with arXiv:2112.03476
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[37]  arXiv:2208.03309 (cross-list from cs.LG) [pdf, other]
Title: Lethal Dose Conjecture on Data Poisoning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[38]  arXiv:2208.03111 (cross-list from cs.LG) [pdf, other]
Title: Data-free Backdoor Removal based on Channel Lipschitzness
Comments: Accepted to ECCV 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[39]  arXiv:2208.02905 (cross-list from cs.CY) [pdf, ps, other]
Title: Can the Government Compel Decryption? Don't Trust -- Verify
Comments: 16 pages. This is the full version of a forthcoming publication in Proceedings of the 2022 Symposium on Computer Science and Law
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[40]  arXiv:2208.02878 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Counterfactuals via Functional Mechanism
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[41]  arXiv:2208.02868 (cross-list from cs.LG) [pdf, other]
Title: GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation
Comments: This article will be presented in the International Conference on Compilers, Architectures, and Synthesis for Embedded Systems (CASES) 2022 and will appear as part of the ESWEEK-TCAD special issue
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Fri, 5 Aug 2022

[42]  arXiv:2208.02733 [pdf, other]
Title: On False Data Injection Attack against Building Automation Systems
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2208.02699 [pdf, other]
Title: Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Comments: Extended version of a paper accepted at ESORICS 2022
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[44]  arXiv:2208.02672 [pdf, other]
Title: Information Flow Control-by-Construction for an Object-Oriented Language Using Type Modifiers
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2208.02615 [pdf, other]
Title: SROS2: Usable Cyber Security Tools for ROS 2
Comments: Accepted, IROS 2022, 7 pages, 2 figures, 5 code listings, 5 sections plus references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Robotics (cs.RO); Software Engineering (cs.SE)
[46]  arXiv:2208.02592 [pdf, other]
Title: Design Considerations and Architecture for a Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[47]  arXiv:2208.02500 [pdf, other]
Title: "Yeah, it does have a...Windows `98 Vibe'': Usability Study of Security Features in Programmable Logic Controllers
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC); Systems and Control (eess.SY)
[48]  arXiv:2208.02310 [pdf, other]
Title: Design of secure and robust cognitive system for malware detection
Authors: Sanket Shukla
Comments: arXiv admin note: substantial text overlap with arXiv:2104.06652
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[49]  arXiv:2208.02759 (cross-list from cs.HC) [pdf, other]
Title: New Differential Privacy Communication Pipeline and Design Framework
Comments: poster
Journal-ref: The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[50]  arXiv:2208.02724 (cross-list from eess.SP) [pdf, other]
Title: Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[51]  arXiv:2208.02587 (cross-list from cs.LG) [pdf]
Title: Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption
Comments: 26 pages; 1 Figure; 7 Tables. arXiv admin note: text overlap with arXiv:2205.13265
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[52]  arXiv:2208.02556 (cross-list from cs.CV) [pdf, other]
Title: Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Comments: arXiv admin note: text overlap with arXiv:2205.12041
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[53]  arXiv:2208.02482 (cross-list from cs.CV) [pdf, other]
Title: Privacy Safe Representation Learning via Frequency Filtering Encoder
Comments: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety (AISafety 2022)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54]  arXiv:2208.02468 (cross-list from math.GR) [pdf, ps, other]
Title: On Compression Functions over Small Groups with Applications to Cryptography
Authors: Koji Nuida
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[55]  arXiv:2208.02369 (cross-list from cs.AI) [pdf, other]
Title: Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework
Comments: 12 pages, 3 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[56]  arXiv:2208.02304 (cross-list from cs.LG) [pdf, other]
Title: How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[57]  arXiv:2208.02250 (cross-list from cs.SD) [pdf]
Title: Adversarial Attacks on ASR Systems: An Overview
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)

Thu, 4 Aug 2022

[58]  arXiv:2208.02244 [pdf, other]
Title: Contrasting global approaches for identifying and managing cybersecurity risks in supply chains
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[59]  arXiv:2208.02201 [pdf, other]
Title: Statistical Decoding 2.0: Reducing Decoding to LPN
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2208.02160 [pdf]
Title: Scrypt Mining with ASICs
Comments: Published in 2014
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2208.02159 [pdf, other]
Title: CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[62]  arXiv:2208.02125 [pdf, other]
Title: Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Comments: Submitted to IEEE TIFS and currently under review
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2208.02094 [pdf]
Title: A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[64]  arXiv:2208.02093 [pdf, other]
Title: Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2208.01968 [pdf, other]
Title: Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[66]  arXiv:2208.01919 [pdf, other]
Title: Spectrum Focused Frequency Adversarial Attacks for Automatic Modulation Classification
Authors: Sicheng Zhang (1), Jiarun Yu (1), Zhida Bao (1), Shiwen Mao (2), Yun Lin (1) ((1) College of Information and Communication Engineering, Harbin Engineering University, Harbin, (2) Department of Electrical & Computer Engineering, Auburn University, Auburn)
Comments: 6 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[67]  arXiv:2208.01908 [pdf, other]
Title: Mass Exit Attacks on the Lightning Network
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[68]  arXiv:2208.01886 [pdf, other]
Title: Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2208.01826 [pdf, ps, other]
Title: A New Implementation of Federated Learning for Privacy and Security Enhancement
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2208.01703 [pdf, other]
Title: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[71]  arXiv:2208.01700 [pdf, other]
Title: Differentially Private Vertical Federated Clustering
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2208.01639 [pdf, ps, other]
Title: Sharpening Your Tools: Updating bulk_extractor for the 2020s
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2208.01636 [pdf, ps, other]
Title: A Roadmap for Greater Public Use of Privacy-Sensitive Government Data: Workshop Report
Comments: 23 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (cs.LG)
[74]  arXiv:2208.01635 [pdf]
Title: Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, Volume 21, No 2
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 2, pages 71-88
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2208.01634 [pdf]
Title: Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2208.02177 (cross-list from cs.NI) [pdf, other]
Title: On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives
Comments: 42 pages, 14 figures, to be published in Journal of Network and Systems Management - Special Issue on Blockchains and Distributed Ledgers in Network and Service Management
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[77]  arXiv:2208.01946 (cross-list from cs.DC) [pdf, other]
Title: Mixed Fault Tolerance Protocols with Trusted Execution Environment
Authors: Mingyuan Gao (1), Hung Dang (2), Ee-Chien Chang (1), Jialin Li (1) ((1) National University of Singapore, Singapore (2) FPT Blockchain Lab, Vietnam)
Comments: 12 pages, 3 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[78]  arXiv:2208.01847 (cross-list from quant-ph) [pdf, other]
Title: Advance sharing of quantum shares for classical secrets
Comments: 23 pages, 1 figure, 1 table. This research is in part presented at QCrypt 2022, Taipei City, Taiwan, August 29-September 2, 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[79]  arXiv:2208.01819 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Camouflage for Node Injection Attack on Graphs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[80]  arXiv:2208.01693 (cross-list from cs.CL) [pdf, other]
Title: Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Journal-ref: Workshop on Machine Learning for Cybersecurity, 2022 International Conference on Machine Learning
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 3 Aug 2022

[81]  arXiv:2208.01548 [pdf, other]
Title: A Turning Point for Verified Spectre Sandboxing
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2208.01524 [pdf, other]
Title: A replication of a controlled experiment with two STRIDE variants
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[83]  arXiv:2208.01442 [pdf, ps, other]
Title: Improvement of algebraic attacks for solving superdetermined MinRank instances
Authors: Magali Bardet, Manon Bertin (LITIS)
Journal-ref: PQCrypto 2022, Sep 2022, virtual, France
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Symbolic Computation (cs.SC)
[84]  arXiv:2208.01411 [pdf, other]
Title: Locating modifications in signed data for partial data integrity
Comments: 14 pages
Journal-ref: Information Processing Letters 115 (2015) 731-737
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2208.01356 [pdf, other]
Title: SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2208.01277 [pdf, other]
Title: Security Requirement Analysis of Blockchain-based E-Voting Systems
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.01263 [pdf, ps, other]
Title: A ZK-SNARK based Proof of Assets Protocol for Bitcoin Exchanges
Authors: B Swaroopa Reddy
Comments: 9 pages, 2 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2208.01242 [pdf]
Title: Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management
Comments: 14 pages, currently under review
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[89]  arXiv:2208.01113 [pdf, other]
Title: On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Comments: 15 pages, 20 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[90]  arXiv:2208.01595 (cross-list from cs.SE) [pdf, other]
Title: Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[ total of 90 entries: 1-90 ]
[ showing up to 104 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)