We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 17

[ total of 72 entries: 1-25 | 18-42 | 43-67 | 68-72 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 27 Sep 2022 (continued, showing last 14 of 18 entries)

[18]  arXiv:2209.12482 [pdf]
Title: Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity
Comments: Accepted by TrustCom-2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[19]  arXiv:2209.12195 [pdf, other]
Title: SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[20]  arXiv:2209.12145 [pdf, other]
Title: Secure Decentralized IoT Service Platform using Consortium Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[21]  arXiv:2209.12077 [pdf]
Title: Impact of a non-deterministic rekey interval on the performance of arc4random
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2209.12041 [pdf]
Title: Blockchain technologies in the design of Industrial Control Systems for Smart Cities
Authors: Gabriela Ahmadi-Assalemi (1), Haider Al-Khateeb (1) ((1) Cyber Quarter - Midlands Centre for Cyber Security, University of Wolverhampton, UK)
Comments: 8 pages, 5 figures
Journal-ref: published in IEEE Blockchain Technical Briefs, 2022, https://blockchain.ieee.org/technicalbriefs
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2209.11962 [pdf, ps, other]
Title: Trace-based cryptoanalysis of cyclotomic PLWE for the non-split case
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2209.11957 [pdf, ps, other]
Title: Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication
Comments: 16 pages, 20 figures, journal paper. arXiv admin note: text overlap with arXiv:2208.11270
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2209.11904 [pdf, other]
Title: CryptoGCN: Fast and Scalable Homomorphically Encrypted Graph Convolutional Network Inference
Comments: Accepted in Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[26]  arXiv:2209.11878 [pdf, other]
Title: "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software
Comments: To appear in USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[27]  arXiv:2209.11861 [pdf, other]
Title: Authentication and encryption for a robotic ad hoc network using identity-based cryptography
Journal-ref: 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data), 2018
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2209.11857 [pdf, other]
Title: Analysis of the new standard hash function
Journal-ref: International Conference on Computer Aided Systems Theory, 142-149, 2013
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2209.11802 [pdf]
Title: Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2209.12046 (cross-list from cs.LG) [pdf, other]
Title: Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[31]  arXiv:2209.11865 (cross-list from cs.NI) [pdf, other]
Title: Revocation management in vehicular ad-hoc networks
Comments: arXiv admin note: substantial text overlap with arXiv:2208.05343
Journal-ref: 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1210-1217, 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 26 Sep 2022

[32]  arXiv:2209.11715 [pdf, other]
Title: The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
Comments: 19 pages, 23 figures. Accepted to NDSS 2023. Code availability: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[33]  arXiv:2209.11650 [pdf, ps, other]
Title: An Algebraic-Geometry Approach to Prime Factorization
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Algebraic Geometry (math.AG); Number Theory (math.NT); Quantum Physics (quant-ph)
[34]  arXiv:2209.11647 [pdf, other]
Title: Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2209.11545 [pdf, other]
Title: Analysis on Blockchain Consensus Mechanism Based on Proof of Work and Proof of Stake
Authors: Shi Yan
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2209.11274 [pdf, other]
Title: Trusted IP solution in multi-tenant cloud FPGA platform
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[37]  arXiv:2209.11739 (cross-list from cs.CV) [pdf]
Title: Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon
Comments: arXiv admin note: substantial text overlap with arXiv:2209.09652, arXiv:2209.02430
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38]  arXiv:2209.11595 (cross-list from cs.LG) [pdf, other]
Title: Differentially private partitioned variational inference
Comments: 30 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[39]  arXiv:2209.11531 (cross-list from eess.IV) [pdf, other]
Title: Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Fri, 23 Sep 2022 (showing first 3 of 14 entries)

[40]  arXiv:2209.11198 [pdf, other]
Title: A Dive into WhatsApp's End-to-End Encryption
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2209.11197 [pdf]
Title: An Overview of Phishing Victimization: Human Factors, Training and the Role of Emotions
Authors: Mousa Jari
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Literature (cs.GL); Human-Computer Interaction (cs.HC)
[42]  arXiv:2209.11196 [pdf]
Title: Perceived Security of E-Learning Portal
Subjects: Cryptography and Security (cs.CR)
[ total of 72 entries: 1-25 | 18-42 | 43-67 | 68-72 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)