We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 26

[ total of 129 entries: 1-10 | 7-16 | 17-26 | 27-36 | 37-46 | 47-56 | 57-66 | ... | 127-129 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 14 May 2024 (continued, showing last 7 of 33 entries)

[27]  arXiv:2405.07430 (cross-list from cs.SE) [pdf, other]
Title: Don't Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[28]  arXiv:2405.07265 (cross-list from cs.DC) [pdf, other]
Title: An Approach for Decentralized Authentication in Networks of UAVs
Comments: 5 pages
Journal-ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto Portugal, April 2021, pp. 13-17, ISSN 2308-4294
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[29]  arXiv:2405.07196 (cross-list from cs.DB) [pdf, other]
Title: Permissioned Blockchain-based Framework for Ranking Synthetic Data Generators
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[30]  arXiv:2405.07061 (cross-list from cs.LG) [pdf, other]
Title: LLMs and the Future of Chip Design: Unveiling Security Risks and Building Trust
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[31]  arXiv:2405.07020 (cross-list from cs.LG) [pdf, other]
Title: Adaptive Online Bayesian Estimation of Frequency Distributions with Local Differential Privacy
Comments: Code for experiments available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[32]  arXiv:2405.06865 (cross-list from cs.CV) [pdf, other]
Title: Disrupting Style Mimicry Attacks on Video Imagery
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[33]  arXiv:2405.06787 (cross-list from quant-ph) [pdf, other]
Title: A computational test of quantum contextuality, and even simpler proofs of quantumness
Comments: 69 pages, 6 figures. For updates see this https URL
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Mon, 13 May 2024 (showing first 3 of 21 entries)

[34]  arXiv:2405.06498 [pdf, other]
Title: Implementation Study of Cost-Effective Verification for Pietrzak's Verifiable Delay Function in Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2405.06371 [pdf, other]
Title: Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
Authors: Jan H. Klemmer (1), Stefan Albert Horstmann (2), Nikhil Patnaik (3), Cordelia Ludden (4), Cordell Burton Jr (4), Carson Powers (4), Fabio Massacci (5 and 6), Akond Rahman (7), Daniel Votipka (4), Heather Richter Lipford (8), Awais Rashid (3), Alena Naiakshina (2), Sascha Fahl (1) ((1) CISPA Helmholtz Center for Information Security, (2) Ruhr University Bochum, (3) University of Bristol, (4) Tufts University, (5) Vrije Universiteit Amsterdam, (6) University of Trento, (7) Auburn University, (8) University of North Carolina at Charlotte)
Comments: 20 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[36]  arXiv:2405.06356 [pdf, other]
Title: CRATOR: a Dark Web Crawler
Subjects: Cryptography and Security (cs.CR)
[ total of 129 entries: 1-10 | 7-16 | 17-26 | 27-36 | 37-46 | 47-56 | 57-66 | ... | 127-129 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)