We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2018, skipping first 50

[ total of 251 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251 ]
[ showing 50 entries per page: fewer | more | all ]
[51]  arXiv:1811.03246 [pdf, ps, other]
Title: A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:1811.03265 [pdf, ps, other]
Title: YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes
Comments: To appear at Network and Distributed Systems Security (NDSS) Symposium 2019 24-27 February 2019, San Diego, CA, USA
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:1811.03290 [pdf]
Title: Security Risk Assessment in Internet of Things Systems
Comments: 9 pages, 1 figure
Journal-ref: IT Professional (Volume: 19, Issue: 5, 2017 )
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[54]  arXiv:1811.03457 [pdf, other]
Title: TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:1811.03685 [pdf, other]
Title: New CleverHans Feature: Better Adversarial Robustness Evaluations with Attack Bundling
Authors: Ian Goodfellow
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[56]  arXiv:1811.03716 [pdf, other]
Title: Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning via Real-World Measurements
Comments: NDSS 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[57]  arXiv:1811.03725 [pdf, ps, other]
Title: EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:1811.03727 [pdf, ps, other]
Title: VDAS: Verifiable Data Aggregation Scheme for Internet of Things
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:1811.03730 [pdf, ps, other]
Title: MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:1811.03741 [pdf, ps, other]
Title: Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:1811.03789 [pdf, ps, other]
Title: Construction of isodual codes from polycirculant matrices
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:1811.03934 [pdf, other]
Title: RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach
Authors: Jonathan Roux (LAAS-TSF), Eric Alata (LAAS-TSF, INSA Toulouse), Guillaume Auriol (LAAS-TSF, INSA Toulouse), Mohamed Kaâniche (LAAS-TSF), Vincent Nicomette (LAAS-TSF, INSA Toulouse), Romain Cayre (LAAS-TSF)
Journal-ref: International Symposium on Network Computing and Applications - IEEE-NCA 2018, Nov 2018, Cambridge, Massachusetts, United States. 2018
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[63]  arXiv:1811.03974 [pdf, other]
Title: Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use
Journal-ref: Proceedings of the 2018 ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC@CCS 2018)
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:1811.04035 [pdf, other]
Title: A Search for Good Pseudo-random Number Generators : Survey and Empirical Studies
Subjects: Cryptography and Security (cs.CR); Mathematical Software (cs.MS)
[65]  arXiv:1811.04195 [pdf, other]
Title: CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized KD-Forest
Comments: 13 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:1811.04304 [pdf]
Title: Metamorphic Malware Detection Using Linear Discriminant Analysis and Graph Similarity
Comments: 5th International Conference on Computer and Knowledge Engineering (lCCKE)
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:1811.04349 [pdf, ps, other]
Title: Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity
Comments: 10 pages, 4 figures, conference
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:1811.04366 [pdf, ps, other]
Title: ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:1811.04582 [pdf]
Title: A Lightweight Signature-Based IDS for IoT Environment
Comments: 4 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:1811.04583 [pdf]
Title: SD-WAN Threat Landscape
Comments: 24 pages, 6 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:1811.04720 [pdf]
Title: Automatically Generate Steganographic Text Based on Markov Model and Huffman Coding
Comments: Submitted to IETE Technical Review
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:1811.04794 [pdf, other]
Title: The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students
Comments: Full-length report with 18 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:1811.04900 [pdf, other]
Title: Efficient Public Blockchain Client for Lightweight Users
Comments: A preliminary version of this paper was published in SERIAL 2017
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:1811.05284 [pdf, other]
Title: Right to Sign: Safeguarding data immutability in blockchain systems with cryptographic signatures over a broad range of available consensus finding scenarios
Comments: 5 pages, 8 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:1811.05296 [pdf, other]
Title: SAFE: Self-Attentive Function Embeddings for Binary Similarity
Comments: Published in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 2019
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[76]  arXiv:1811.05378 [pdf, ps, other]
Title: Interface-Based Side Channel Attack Against Intel SGX
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:1811.05385 [pdf, ps, other]
Title: On Finding Quantum Multi-collisions
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Quantum Physics (quant-ph)
[78]  arXiv:1811.05441 [pdf, other]
Title: A Systematic Evaluation of Transient Execution Attacks and Defenses
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:1811.05465 [pdf, other]
Title: Towards a hardware-assisted information flow tracking ecosystem for ARM processors
Comments: 2 pages, FPL 2016 - PhD forum
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:1811.05945 [pdf, other]
Title: Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[81]  arXiv:1811.06012 [pdf, other]
Title: Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices
Comments: Published TETC version; original arxiv preprint found in v1
Subjects: Cryptography and Security (cs.CR); Mesoscale and Nanoscale Physics (cond-mat.mes-hall); Emerging Technologies (cs.ET)
[82]  arXiv:1811.06078 [pdf, other]
Title: Phishing in an Academic Community: A Study of User Susceptibility and Behavior
Comments: 7 pages, 5 figures, 3 tables, submitted to Cryptologia
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:1811.06143 [pdf, other]
Title: Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things
Comments: 14 pages, 18 Figures
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:1811.06162 [pdf, other]
Title: Plan Interdiction Games
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:1811.06246 [pdf, other]
Title: McEliece Cryptosystem Based On Extended Golay Code
Comments: 7
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:1811.06343 [pdf, ps, other]
Title: Achieving Differential Privacy using Methods from Calculus
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:1811.06386 [pdf, ps, other]
Title: Tropical cryptography II: extensions by homomorphisms
Comments: 7 pages. arXiv admin note: text overlap with arXiv:1301.1195
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:1811.06414 [pdf, ps, other]
Title: Many Phish in the $\mathcal{C}$: A Coexisting-Choice-Criteria Model of Security Behavior
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:1811.06539 [pdf, ps, other]
Title: A note on hyperparameters in black-box adversarial examples
Authors: Jamie Hayes
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[90]  arXiv:1811.06584 [pdf, other]
Title: Cybercasing 2.0: You Get What You Pay For
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:1811.06591 [pdf, other]
Title: Physical-Layer Security: Does it Work in a Real Environment?
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:1811.06624 [pdf, other]
Title: Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit
Journal-ref: The Oxford Handbook of Cyberpsychology, 2018
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[93]  arXiv:1811.06632 [pdf, other]
Title: Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Security Threats
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:1811.06751 [pdf, other]
Title: All roads lead to Rome: Many ways to double spend your cryptocurrency
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[95]  arXiv:1811.06822 [pdf, other]
Title: Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Comments: Published in Proc. International Conference On Computer Aided Design (ICCAD) 2018
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[96]  arXiv:1811.06888 [pdf, other]
Title: The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development
Comments: To appear in IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[97]  arXiv:1811.06917 [pdf]
Title: ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:1811.06918 [pdf]
Title: Protecting User Privacy Based on Secret Sharing with Error Tolerance for Big Data in Smart Grid
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:1811.06922 [pdf, other]
Title: The 5G-AKA Authentication Protocol Privacy
Authors: Adrien Koutsos
Comments: Changes: - added details when describing some attacks. - added a constant message in the AKA+ protocol
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:1811.06936 [pdf, other]
Title: Deciding Indistinguishability
Authors: Adrien Koutsos
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[ total of 251 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2210, contact, help  (Access key information)