We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 42

[ total of 65 entries: 1-25 | 18-42 | 43-65 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 27 Sep 2022 (continued, showing last 15 of 18 entries)

[43]  arXiv:2209.12683 [pdf]
Title: Evaluating Malware Forensics Tools
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2209.12482 [pdf]
Title: Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity
Comments: Accepted by TrustCom-2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2209.12195 [pdf, other]
Title: SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[46]  arXiv:2209.12145 [pdf, other]
Title: Secure Decentralized IoT Service Platform using Consortium Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[47]  arXiv:2209.12077 [pdf]
Title: Impact of a non-deterministic rekey interval on the performance of arc4random
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2209.12041 [pdf]
Title: Blockchain technologies in the design of Industrial Control Systems for Smart Cities
Authors: Gabriela Ahmadi-Assalemi (1), Haider Al-Khateeb (1) ((1) Cyber Quarter - Midlands Centre for Cyber Security, University of Wolverhampton, UK)
Comments: 8 pages, 5 figures
Journal-ref: published in IEEE Blockchain Technical Briefs, 2022, https://blockchain.ieee.org/technicalbriefs
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2209.11962 [pdf, ps, other]
Title: Trace-based cryptoanalysis of cyclotomic PLWE for the non-split case
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2209.11957 [pdf, ps, other]
Title: Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication
Comments: 16 pages, 20 figures, journal paper. arXiv admin note: text overlap with arXiv:2208.11270
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2209.11904 [pdf, other]
Title: CryptoGCN: Fast and Scalable Homomorphically Encrypted Graph Convolutional Network Inference
Comments: Accepted in Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[52]  arXiv:2209.11878 [pdf, other]
Title: "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software
Comments: To appear in USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[53]  arXiv:2209.11861 [pdf, other]
Title: Authentication and encryption for a robotic ad hoc network using identity-based cryptography
Journal-ref: 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data), 2018
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2209.11857 [pdf, other]
Title: Analysis of the new standard hash function
Journal-ref: International Conference on Computer Aided Systems Theory, 142-149, 2013
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2209.11802 [pdf]
Title: Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2209.12046 (cross-list from cs.LG) [pdf, other]
Title: Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[57]  arXiv:2209.11865 (cross-list from cs.NI) [pdf, other]
Title: Revocation management in vehicular ad-hoc networks
Comments: arXiv admin note: substantial text overlap with arXiv:2208.05343
Journal-ref: 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1210-1217, 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 26 Sep 2022

[58]  arXiv:2209.11715 [pdf, other]
Title: The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
Comments: 19 pages, 23 figures. Accepted to NDSS 2023. Code availability: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[59]  arXiv:2209.11650 [pdf, ps, other]
Title: An Algebraic-Geometry Approach to Prime Factorization
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Algebraic Geometry (math.AG); Number Theory (math.NT); Quantum Physics (quant-ph)
[60]  arXiv:2209.11647 [pdf, other]
Title: Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2209.11545 [pdf, other]
Title: Analysis on Blockchain Consensus Mechanism Based on Proof of Work and Proof of Stake
Authors: Shi Yan
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2209.11274 [pdf, other]
Title: Trusted IP solution in multi-tenant cloud FPGA platform
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[63]  arXiv:2209.11739 (cross-list from cs.CV) [pdf]
Title: Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon
Comments: arXiv admin note: substantial text overlap with arXiv:2209.09652, arXiv:2209.02430
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2209.11595 (cross-list from cs.LG) [pdf, other]
Title: Differentially private partitioned variational inference
Comments: 30 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[65]  arXiv:2209.11531 (cross-list from eess.IV) [pdf, other]
Title: Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[ total of 65 entries: 1-25 | 18-42 | 43-65 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)