We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2018, skipping first 125

[ total of 251 entries: 1-25 | ... | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | ... | 251 ]
[ showing 25 entries per page: fewer | more | all ]
[126]  arXiv:1811.08705 [pdf, other]
Title: Inline Detection of Domain Generation Algorithms with Context-Sensitive Word Embeddings
Comments: 6 pages, 5 figures, 2 tables
Journal-ref: Proceedings of the 2018 IEEE International Conference on Big Data, 2018, pp. 2966-2971
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[127]  arXiv:1811.08951 [pdf, other]
Title: Validating the Contextual Information of Outdoor Images for Photo Misuse Detection
Comments: An extension of our conference paper 'Are You Lying: Validating the Time-Location of Outdoor Images'
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:1811.09024 [pdf]
Title: Building Confidence not to be Phished through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Comments: 15
Journal-ref: International Conferences on Cyber Security and Communication Systems (ICCSCS2018), 2018
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:1811.09144 [pdf, other]
Title: PE-AONT: Partial Encryption combined with an All-or-Nothing Transform
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:1811.09189 [pdf, other]
Title: PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
Comments: Author's version of article to appear in USENIX Security 2019
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:1811.09239 [pdf, other]
Title: Digital Forensics for IoT and WSNs
Comments: 41 pages, 25 figures
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:1811.09322 [pdf, other]
Title: On Profitability of Trailing Mining
Comments: 19 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[133]  arXiv:1811.09340 [pdf, other]
Title: Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles
Comments: This paper is accepted in the 12th ACM International Conference on Web Search and Data Mining (WSDM-2019)
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[134]  arXiv:1811.09447 [pdf, other]
Title: Smart Greybox Fuzzing
Comments: Accepted IEEE Transactions on Software Engineering, 2020
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:1811.09570 [pdf, other]
Title: A Survey on Synchrophasor Data Quality and Cybersecurity Challenges, and Evaluation of their Interdependencies
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:1811.09581 [pdf, ps, other]
Title: About the k-Error Linear Complexity over $\mathbb{F}_p$ of sequences of length 2$p$ with optimal three-level autocorrelation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[137]  arXiv:1811.09712 [pdf, other]
Title: Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[138]  arXiv:1811.09767 [pdf, other]
Title: Survey on Secure Search Over Encrypted Data on the Cloud
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:1811.09876 [pdf, ps, other]
Title: Cryptographic analysis of the Modified Matrix Modular Cryptosystem
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:1811.09943 [pdf, other]
Title: Countering Selfish Mining in Blockchains
Comments: International Workshop on Computing, Networking and Communications (CNC 2019)
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:1811.09944 [pdf, other]
Title: Towards Blockchain-Driven, Secure and Transparent Audit Logs
Comments: The 1st Workshop on Distributed Ledger of Things (DLOT 2018)
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:1811.09951 [pdf, other]
Title: A Fully Private Pipeline for Deep Learning on Electronic Health Records
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:1811.09953 [pdf, other]
Title: Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:1811.10050 [pdf]
Title: Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis
Comments: preprint version of paper published in Security and Communication Networks special issue on Data-Driven Cybersecurity
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:1811.10168 [pdf, other]
Title: Which One to Go: Security and Usability Evaluation of Mid-Air Gestures
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:1811.10254 [pdf, ps, other]
Title: Compressible and Learnable Encryption for Untrusted Cloud Environments
Authors: Hitoshi Kiya
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:1811.10256 [pdf, other]
Title: Generalised Differential Privacy for Text Document Processing
Comments: Typos corrected
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[148]  arXiv:1811.10296 [pdf, other]
Title: Distributed and Secure ML with Self-tallying Multi-party Aggregation
Comments: NeurIPS 2018 Workshop on PPML
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:1811.10548 [pdf, ps, other]
Title: A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[150]  arXiv:1811.10851 [pdf, other]
Title: How a simple bug in ML compiler could be exploited for backdoors?
Authors: Baptiste David
Comments: 8 pages, 15 figures, 5 sections. White paper of the talk presented at ZeroNight 2018 in Saint-Petersburg
Subjects: Cryptography and Security (cs.CR)
[ total of 251 entries: 1-25 | ... | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | ... | 251 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2209, contact, help  (Access key information)