We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2018, skipping first 100

[ total of 251 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | ... | 251 ]
[ showing 25 entries per page: fewer | more | all ]
[101]  arXiv:1811.07005 [pdf, other]
Title: DifFuzz: Differential Fuzzing for Side-Channel Analysis
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[102]  arXiv:1811.07018 [pdf, ps, other]
Title: Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues
Comments: Proceedings of the 27th International Conference on Computer Communications and Networks (ICCCN), Hangzhou, China, July-August 2018. arXiv admin note: text overlap with arXiv:1803.09156
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[103]  arXiv:1811.07028 [pdf, other]
Title: A Trust Management Scheme for IoT-Enabled Environmental Health/Accessibility Monitoring Services
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:1811.07060 [pdf, other]
Title: Biometric-Based Wearable User Authentication During Sedentary and Non-sedentary Periods
Comments: 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec)
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:1811.07153 [pdf, other]
Title: Robust Website Fingerprinting Through the Cache Occupancy Channel
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[106]  arXiv:1811.07276 [pdf, other]
Title: libmpk: Software Abstraction for Intel Memory Protection Keys
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:1811.07335 [pdf, other]
Title: Distribution Discrepancy Maximization for Image Privacy Preserving
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[108]  arXiv:1811.07366 [pdf, other]
Title: WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective)
Comments: This paper has been accepted and presented at the 14th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:1811.07367 [pdf, other]
Title: slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things
Comments: This paper has been accepted at the 2018 IEEE Conference on Dependable and Secure Computing (DSC)
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:1811.07525 [pdf, other]
Title: DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
[111]  arXiv:1811.07642 [pdf, other]
Title: Anonymous Single Sign-on with Proxy Re-Verification
Comments: 20 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[112]  arXiv:1811.07842 [pdf, other]
Title: Behavioral Malware Classification using Convolutional Recurrent Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[113]  arXiv:1811.07864 [pdf]
Title: Secure Data Access for Wireless Body Sensor Networks
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:1811.08097 [pdf, ps, other]
Title: Improved Quantum Multicollision-Finding Algorithm
Comments: To appear at PQCrypto 2019
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS); Quantum Physics (quant-ph)
[115]  arXiv:1811.08234 [pdf, other]
Title: Contextual and Granular Policy Enforcement in Database-backed Applications
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:1811.08257 [pdf, other]
Title: FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:1811.08263 [pdf, other]
Title: A Deep Dive into Blockchain Selfish Mining
Comments: 6 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[118]  arXiv:1811.08271 [pdf]
Title: A Low-latency Secure Data Outsourcing Scheme for Cloud-WSN
Comments: arXiv admin note: text overlap with arXiv:1810.10746
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:1811.08360 [pdf, other]
Title: Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication
Comments: This paper has been accepted for publication in IEEE Transactions on Information Forensics and Security. Content is final as presented here, with the exception of pagination. IEEE Copyright Notice: Copyright (c) 2019 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing pubs-permissions@ieee.org
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[120]  arXiv:1811.08507 [pdf]
Title: Ultra-Low Power Crypto-Engine Based on Simon 32/64 for Energy- and Area-Constrained Integrated Systems
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[121]  arXiv:1811.08531 [pdf, other]
Title: Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR
Comments: 7 pages, 1 figure, GDPR, Privacy, Cyber Threat Intelligence, Biometrics. To be appeared in the Proceedings of the 2018 IEEE International Conference on Big Data
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:1811.08569 [pdf, other]
Title: Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[123]  arXiv:1811.08572 [pdf, other]
Title: Bitcoin: A Natural Oligopoly
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[124]  arXiv:1811.08641 [pdf, other]
Title: Malicious Web Request Detection Using Character-level CNN
Comments: 11 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:1811.08660 [pdf, other]
Title: The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR
Subjects: Cryptography and Security (cs.CR)
[ total of 251 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | ... | 251 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2209, contact, help  (Access key information)