We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 50

[ total of 96 entries: 1-10 | ... | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | 91-96 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 16 Aug 2022 (continued, showing 10 of 27 entries)

[51]  arXiv:2208.07127 [pdf, other]
Title: Deception for Cyber Defence: Challenges and Opportunities
Journal-ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[52]  arXiv:2208.07060 [pdf, ps, other]
Title: A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2208.07049 [pdf, other]
Title: Self-Supervised Vision Transformers for Malware Detection
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[54]  arXiv:2208.06943 [pdf, other]
Title: GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing
Comments: 9 pages, 8 tables, 3 figures
Journal-ref: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2022, pp. 10-18
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[55]  arXiv:2208.06774 [pdf, other]
Title: Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2208.06722 [pdf, other]
Title: A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2208.06692 [pdf, other]
Title: BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[58]  arXiv:2208.06628 [pdf, other]
Title: CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2208.06594 [pdf]
Title: Using identity-based cryptography in mobile applications
Comments: arXiv admin note: substantial text overlap with arXiv:2208.03541
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 527-536, 2014
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2208.06593 [pdf]
Title: Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems
Comments: arXiv admin note: substantial text overlap with arXiv:2208.06147
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 499-508, 2014
Subjects: Cryptography and Security (cs.CR)
[ total of 96 entries: 1-10 | ... | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | 91-96 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)