We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 72 entries: 1-72 ]
[ showing up to 92 entries per page: fewer | more ]

Wed, 28 Sep 2022

[1]  arXiv:2209.13454 [pdf]
Title: Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation
Comments: Submitted to Springer
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
[2]  arXiv:2209.13431 [pdf]
Title: MTTBA- A Key Contributor for Sustainable Energy Consumption Time and Space Utility for Highly Secured Crypto Transactions in Blockchain Technology
Comments: 15 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2209.13288 [pdf, other]
Title: A Benchmark Comparison of Python Malware Detection Approaches
Comments: 12 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[4]  arXiv:2209.13073 [pdf]
Title: Preprint: Privacy-preserving IoT Data Sharing Scheme
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2209.12993 [pdf, other]
Title: Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)
Comments: This is an extended version of a paper with the same name that will be presented in the 32nd Usenix Security Symposium (USENIX 2023)
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2209.12987 [pdf, other]
Title: TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[7]  arXiv:2209.12985 [pdf, other]
Title: A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2209.12984 [pdf, other]
Title: Characteristics and Main Threats about Multi-Factor Authentication: A Survey
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[9]  arXiv:2209.13523 (cross-list from cs.LG) [pdf, other]
Title: Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[10]  arXiv:2209.13113 (cross-list from cs.CV) [pdf, other]
Title: FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Comments: 27 pages, 4 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[11]  arXiv:2209.13081 (cross-list from quant-ph) [pdf, ps, other]
Title: Functional Encryption with Secure Key Leasing
Journal-ref: In: Agrawal S., Lin D. (eds) Advances in Cryptology - Asiacrypt 2022 - LNCS
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[12]  arXiv:2209.13007 (cross-list from cs.NI) [pdf, other]
Title: Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Comments: IEEE GLOBECOM 2022 Publication
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[13]  arXiv:2209.12962 (cross-list from cs.CV) [pdf, other]
Title: FaRO 2: an Open Source, Configurable Smart City Framework for Real-Time Distributed Vision and Biometric Systems
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Tue, 27 Sep 2022

[14]  arXiv:2209.12867 [pdf, other]
Title: Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[15]  arXiv:2209.12742 [pdf, other]
Title: Too Many Options: A Survey of ABE Libraries for Developers
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2209.12698 [pdf, other]
Title: QuantumSolver: A quantum tool-set for developers
Comments: 10 pages, 4 figures, sumited to CAITS, SAM, CSCE, Springer Nature, Indexed by Computing Research and Education (CORE) with ranking C, Indexed by CS Conference Rankings (0.83), Indexed by GII-GRIN in Class WiP
Journal-ref: CAITS, SAM, CSCE. The 2022 World Congress in Computer Science, Computer Engineering, and Applied Computing. CSCE 2022, pg. 149. ISBN # 1-60132-516-9; American Council on Science & Education Las Vegas, USA. July 25-28, 2022
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2209.12683 [pdf]
Title: Evaluating Malware Forensics Tools
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2209.12482 [pdf]
Title: Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity
Comments: Accepted by TrustCom-2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[19]  arXiv:2209.12195 [pdf, other]
Title: SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[20]  arXiv:2209.12145 [pdf, other]
Title: Secure Decentralized IoT Service Platform using Consortium Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[21]  arXiv:2209.12077 [pdf]
Title: Impact of a non-deterministic rekey interval on the performance of arc4random
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2209.12041 [pdf]
Title: Blockchain technologies in the design of Industrial Control Systems for Smart Cities
Authors: Gabriela Ahmadi-Assalemi (1), Haider Al-Khateeb (1) ((1) Cyber Quarter - Midlands Centre for Cyber Security, University of Wolverhampton, UK)
Comments: 8 pages, 5 figures
Journal-ref: published in IEEE Blockchain Technical Briefs, 2022, https://blockchain.ieee.org/technicalbriefs
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2209.11962 [pdf, ps, other]
Title: Trace-based cryptoanalysis of cyclotomic PLWE for the non-split case
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2209.11957 [pdf, ps, other]
Title: Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication
Comments: 16 pages, 20 figures, journal paper. arXiv admin note: text overlap with arXiv:2208.11270
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2209.11904 [pdf, other]
Title: CryptoGCN: Fast and Scalable Homomorphically Encrypted Graph Convolutional Network Inference
Comments: Accepted in Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[26]  arXiv:2209.11878 [pdf, other]
Title: "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software
Comments: To appear in USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[27]  arXiv:2209.11861 [pdf, other]
Title: Authentication and encryption for a robotic ad hoc network using identity-based cryptography
Journal-ref: 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data), 2018
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2209.11857 [pdf, other]
Title: Analysis of the new standard hash function
Journal-ref: International Conference on Computer Aided Systems Theory, 142-149, 2013
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2209.11802 [pdf]
Title: Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2209.12046 (cross-list from cs.LG) [pdf, other]
Title: Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[31]  arXiv:2209.11865 (cross-list from cs.NI) [pdf, other]
Title: Revocation management in vehicular ad-hoc networks
Comments: arXiv admin note: substantial text overlap with arXiv:2208.05343
Journal-ref: 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1210-1217, 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 26 Sep 2022

[32]  arXiv:2209.11715 [pdf, other]
Title: The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
Comments: 19 pages, 23 figures. Accepted to NDSS 2023. Code availability: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[33]  arXiv:2209.11650 [pdf, ps, other]
Title: An Algebraic-Geometry Approach to Prime Factorization
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Algebraic Geometry (math.AG); Number Theory (math.NT); Quantum Physics (quant-ph)
[34]  arXiv:2209.11647 [pdf, other]
Title: Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2209.11545 [pdf, other]
Title: Analysis on Blockchain Consensus Mechanism Based on Proof of Work and Proof of Stake
Authors: Shi Yan
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2209.11274 [pdf, other]
Title: Trusted IP solution in multi-tenant cloud FPGA platform
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[37]  arXiv:2209.11739 (cross-list from cs.CV) [pdf]
Title: Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon
Comments: arXiv admin note: substantial text overlap with arXiv:2209.09652, arXiv:2209.02430
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38]  arXiv:2209.11595 (cross-list from cs.LG) [pdf, other]
Title: Differentially private partitioned variational inference
Comments: 30 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[39]  arXiv:2209.11531 (cross-list from eess.IV) [pdf, other]
Title: Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Fri, 23 Sep 2022

[40]  arXiv:2209.11198 [pdf, other]
Title: A Dive into WhatsApp's End-to-End Encryption
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2209.11197 [pdf]
Title: An Overview of Phishing Victimization: Human Factors, Training and the Role of Emotions
Authors: Mousa Jari
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Literature (cs.GL); Human-Computer Interaction (cs.HC)
[42]  arXiv:2209.11196 [pdf]
Title: Perceived Security of E-Learning Portal
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2209.11194 [pdf, ps, other]
Title: On the Heritage of Crypto Assets -- Tales From the Crypt Protocol
Authors: Frédéric Prost (LIG, UGA)
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2209.11158 [pdf, other]
Title: Multi-Tenant Cloud FPGA: A Survey on Security
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[45]  arXiv:2209.11108 [pdf, other]
Title: Linking Contexts from Distinct Data Sources in Zero Trust Federation
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2209.11103 [pdf, other]
Title: To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild
Comments: 8 pages, to be published in the proceedings of The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2021), October 28-30, 2022, Wuhan, China
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[47]  arXiv:2209.11032 [pdf, other]
Title: DeepThought: a Reputation and Voting-based Blockchain Oracle
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[48]  arXiv:2209.11025 [pdf, other]
Title: Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2209.10908 [pdf, other]
Title: Improving Utility for Privacy-Preserving Analysis of Correlated Columns using Pufferfish Privacy
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2209.10717 [pdf, other]
Title: Talking Trojan: Analyzing an Industry-Wide Disclosure
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2209.11020 (cross-list from cs.CV) [pdf, other]
Title: Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models
Comments: This is a major revision of a paper titled "Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models" by the same authors that appears at IJCB 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[52]  arXiv:2209.10849 (cross-list from cs.HC) [pdf, other]
Title: You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[53]  arXiv:2209.10732 (cross-list from cs.LG) [pdf, other]
Title: In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Comments: To appear at NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Thu, 22 Sep 2022

[54]  arXiv:2209.10457 [pdf, other]
Title: Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[55]  arXiv:2209.10414 [pdf, other]
Title: An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[56]  arXiv:2209.10412 [pdf, other]
Title: Scalable Discovery and Continuous Inventory of Personal Data at Rest in Cloud Native Systems
Comments: Preprint of 2022-09-09 before final copy-editing of an accepted peer-reviewed paper to appear in the Proceedings of the 20th International Conference on Service-Oriented Computing ICSOC 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[57]  arXiv:2209.10410 [pdf]
Title: Cold Supply Chain Planning including Smart Contracts: An Intelligent Blockchain-based approach
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2209.10407 [pdf]
Title: Adopting the Cybersecurity Concepts into Curriculum The Potential Effects on Students Cybersecurity Knowledge
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2209.10406 [pdf, other]
Title: Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[60]  arXiv:2209.10317 [pdf, other]
Title: Android Private Compute Core Architecture
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[61]  arXiv:2209.10240 [pdf, other]
Title: Fingerprinting Robot Movements via Acoustic Side Channel
Comments: 11 pages, 4 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[62]  arXiv:2209.10224 [pdf, other]
Title: Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study
Comments: 24 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[63]  arXiv:2209.10179 [pdf, other]
Title: Reconstructing Robot Operations via Radio-Frequency Side-Channel
Comments: 10 pages, 7 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[64]  arXiv:2209.10125 [pdf, other]
Title: Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT)
[65]  arXiv:2209.10119 [pdf, other]
Title: Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2209.10083 [pdf, other]
Title: Federated Learning from Pre-Trained Models: A Contrastive Learning Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[67]  arXiv:2209.10321 (cross-list from cs.LO) [pdf, other]
Title: CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms
Authors: Dalton Chichester (University of Mary Washington), Wei Du (University at Albany-SUNY), Raymond Kauffman (University of Mary Washington), Hai Lin (Clarkson University), Christopher Lynch (Clarkson University), Andrew M. Marshall (University of Mary Washington), Catherine A. Meadows (Naval Research Laboratory), Paliath Narendran (University at Albany-SUNY), Veena Ravishankar (University of Mary Washington), Luis Rovira (University of Mary Washington), Brandon Rozek (Rensselaer Polytechnic Institute)
Comments: In Proceedings GandALF 2022, arXiv:2209.09333
Journal-ref: EPTCS 370, 2022, pp. 147-161
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[68]  arXiv:2209.10198 (cross-list from cs.AR) [pdf, other]
Title: HiRA: Hidden Row Activation for Reducing Refresh Latency of Off-the-Shelf DRAM Chips
Comments: To appear in the 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[69]  arXiv:2209.10146 (cross-list from quant-ph) [pdf, other]
Title: Creating quantum-resistant classical-classical OWFs from quantum-classical OWFs
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[70]  arXiv:2209.10117 (cross-list from cs.IR) [pdf, other]
Title: A Comprehensive Survey on Trustworthy Recommender Systems
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2209.09996 (cross-list from cs.LG) [pdf, other]
Title: Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Comments: 10 pages, 10 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[72]  arXiv:2209.09984 (cross-list from cs.LG) [pdf, other]
Title: Learning the Propagation of Worms in Wireless Sensor Networks
Comments: EAI WiCON 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 72 entries: 1-72 ]
[ showing up to 92 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)