We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Mar 2019, skipping first 100

[ total of 201 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201 ]
[ showing 25 entries per page: fewer | more | all ]
[101]  arXiv:1903.09315 [pdf, other]
Title: Statistical Privacy in Distributed Average Consensus on Bounded Real Inputs
Comments: Accepted for 2019 American Control Conference. arXiv admin note: substantial text overlap with arXiv:1809.01794
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[102]  arXiv:1903.09355 [pdf, other]
Title: A Double-Edged Sword: Security Threats and Opportunities in One-Sided Network Communication
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:1903.09365 [pdf, other]
Title: ERHARD-RNG: A Random Number Generator Built from Repurposed Hardware in Embedded Systems
Comments: Updated, in submission; 5 pages, 1 figures
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:1903.09465 [pdf, other]
Title: Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[105]  arXiv:1903.09466 [pdf, other]
Title: Surfing the Web quicker than QUIC via a shared Address Validation
Authors: Erik Sy
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:1903.09482 [pdf, other]
Title: Limitations on Observability of Effects in Cyber-Physical Systems
Comments: Hot Topics on Science of Security (HotSoS 2019)
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:1903.09756 [pdf, other]
Title: PML: An Interpreter-Based Access Control Policy Language for Web Services
Comments: 15 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:1903.09822 [pdf, other]
Title: Scalable Differential Privacy with Certified Robustness in Adversarial Learning
Comments: To appear at ICML'2020 (29 pages)
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:1903.09916 [pdf, other]
Title: Characterizing Location-based Mobile Tracking in Mobile Ad Networks
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:1903.10018 [pdf]
Title: The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Comments: 27 pages
Journal-ref: Security and Communication Networks (SCN), Hindawi, 2019
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:1903.10102 [pdf, other]
Title: A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense
Journal-ref: Proceedings of the 6th ACM Workshop on Moving Target Defense (2019) 57-66
Subjects: Cryptography and Security (cs.CR)
[112]  arXiv:1903.10560 [pdf, other]
Title: Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:1903.10651 [pdf, other]
Title: Restricting Control Flow During Speculative Execution with Venkman
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:1903.10770 [pdf, other]
Title: Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:1903.10778 [pdf]
Title: Data Protection by Design for Cybersecurity Systems in a Smart Home Environment
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:1903.11056 [pdf, ps, other]
Title: RowHammer and Beyond
Authors: Onur Mutlu
Comments: A version of this paper is to appear in the COSADE 2019 proceedings. arXiv admin note: text overlap with arXiv:1703.00626
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:1903.11063 [pdf, other]
Title: BSEA-1 - A Stream Cipher Backdooring Technique
Authors: Eric Filiol
Comments: This work has been presented at the Ruscrypto 2019 conference in Moscow (March 21th, 2019). This paper concerns the continuation of our research work initiated in arXiv:1702.0647. As such, it takes up a reduced part of the abstract and introduction (section 1). All the other sections are totally different.
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:1903.11092 [pdf, other]
Title: Tool Support of Formal Methods for Privacy by Design
Authors: Sibylle Schupp
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[119]  arXiv:1903.11137 [pdf, other]
Title: Hearing your touch: A new acoustic side channel on smartphones
Comments: Paper built on the MPhil thesis of Ilia Shumailov. 2017
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[120]  arXiv:1903.11172 [pdf]
Title: Strategic Alliance for Blockchain Governance Game
Authors: Song-Kyoo Kim
Comments: This paper is the abridged summary of the working paper which is targeting an international journal in the applied mathematics area. arXiv admin note: text overlap with arXiv:1807.05581 because of the minor revision
Journal-ref: Probability in the Engineering and Informational Sciences, 36(1), 184-200 (2022)
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Probability (math.PR)
[121]  arXiv:1903.11237 [pdf, other]
Title: Differential Privacy of Aggregated DC Optimal Power Flow Data
Comments: Accepted by 2019 American Control Conference (ACC)
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[122]  arXiv:1903.11400 [pdf]
Title: Botnet fingerprinting method based on anomaly detection in SMTP conversations
Comments: 6 pages, 4 tables, 3 figures
Journal-ref: IEEE Security & Privacy, vol. 15, issue 6, Nov/Dec 2017, pp. 25-32
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:1903.11640 [pdf, other]
Title: Fundamental Limits of Covert Packet Insertion
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:1903.11688 [pdf, other]
Title: Rallying Adversarial Techniques against Deep Learning for Network Security
Comments: accepted by IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2021)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[125]  arXiv:1903.11700 [pdf, other]
Title: A Conceptual Framework for Assessing Anonymization-Utility Trade-Offs Based on Principal Component Analysis
Subjects: Cryptography and Security (cs.CR)
[ total of 201 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2306, contact, help  (Access key information)