We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 14

[ total of 76 entries: 1-25 | 15-39 | 40-64 | 65-76 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 23 Sep 2022 (continued, showing last 8 of 14 entries)

[15]  arXiv:2209.11103 [pdf, other]
Title: To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild
Comments: 8 pages, to be published in the proceedings of The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2021), October 28-30, 2022, Wuhan, China
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[16]  arXiv:2209.11032 [pdf, other]
Title: DeepThought: a Reputation and Voting-based Blockchain Oracle
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[17]  arXiv:2209.11025 [pdf, other]
Title: Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2209.10908 [pdf, other]
Title: Improving Utility for Privacy-Preserving Analysis of Correlated Columns using Pufferfish Privacy
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2209.10717 [pdf, other]
Title: Talking Trojan: Analyzing an Industry-Wide Disclosure
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2209.11020 (cross-list from cs.CV) [pdf, other]
Title: Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models
Comments: This is a major revision of a paper titled "Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models" by the same authors that appears at IJCB 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[21]  arXiv:2209.10849 (cross-list from cs.HC) [pdf, other]
Title: You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[22]  arXiv:2209.10732 (cross-list from cs.LG) [pdf, other]
Title: In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Comments: To appear at NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Thu, 22 Sep 2022 (showing first 17 of 19 entries)

[23]  arXiv:2209.10457 [pdf, other]
Title: Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[24]  arXiv:2209.10414 [pdf, other]
Title: An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[25]  arXiv:2209.10412 [pdf, other]
Title: Scalable Discovery and Continuous Inventory of Personal Data at Rest in Cloud Native Systems
Comments: Preprint of 2022-09-09 before final copy-editing of an accepted peer-reviewed paper to appear in the Proceedings of the 20th International Conference on Service-Oriented Computing ICSOC 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[26]  arXiv:2209.10410 [pdf]
Title: Cold Supply Chain Planning including Smart Contracts: An Intelligent Blockchain-based approach
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2209.10407 [pdf]
Title: Adopting the Cybersecurity Concepts into Curriculum The Potential Effects on Students Cybersecurity Knowledge
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2209.10406 [pdf, other]
Title: Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[29]  arXiv:2209.10317 [pdf, other]
Title: Android Private Compute Core Architecture
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[30]  arXiv:2209.10240 [pdf, other]
Title: Fingerprinting Robot Movements via Acoustic Side Channel
Comments: 11 pages, 4 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[31]  arXiv:2209.10224 [pdf, other]
Title: Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study
Comments: 24 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[32]  arXiv:2209.10179 [pdf, other]
Title: Reconstructing Robot Operations via Radio-Frequency Side-Channel
Comments: 10 pages, 7 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[33]  arXiv:2209.10125 [pdf, other]
Title: Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT)
[34]  arXiv:2209.10119 [pdf, other]
Title: Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[35]  arXiv:2209.10083 [pdf, other]
Title: Federated Learning from Pre-Trained Models: A Contrastive Learning Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[36]  arXiv:2209.10321 (cross-list from cs.LO) [pdf, other]
Title: CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms
Authors: Dalton Chichester (University of Mary Washington), Wei Du (University at Albany-SUNY), Raymond Kauffman (University of Mary Washington), Hai Lin (Clarkson University), Christopher Lynch (Clarkson University), Andrew M. Marshall (University of Mary Washington), Catherine A. Meadows (Naval Research Laboratory), Paliath Narendran (University at Albany-SUNY), Veena Ravishankar (University of Mary Washington), Luis Rovira (University of Mary Washington), Brandon Rozek (Rensselaer Polytechnic Institute)
Comments: In Proceedings GandALF 2022, arXiv:2209.09333
Journal-ref: EPTCS 370, 2022, pp. 147-161
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[37]  arXiv:2209.10198 (cross-list from cs.AR) [pdf, other]
Title: HiRA: Hidden Row Activation for Reducing Refresh Latency of Off-the-Shelf DRAM Chips
Comments: To appear in the 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[38]  arXiv:2209.10146 (cross-list from quant-ph) [pdf, other]
Title: Creating quantum-resistant classical-classical OWFs from quantum-classical OWFs
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[39]  arXiv:2209.10117 (cross-list from cs.IR) [pdf, other]
Title: A Comprehensive Survey on Trustworthy Recommender Systems
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 76 entries: 1-25 | 15-39 | 40-64 | 65-76 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)