We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 150

[ total of 308 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]
[151]  arXiv:2012.10692 [pdf, other]
Title: Confused Modulo Projection based Somewhat Homomorphic Encryption -- Cryptosystem, Library and Applications on Secure Smart Cities
Comments: IEEE Internet of Things Journal (IOTJ), Published Online: 7 August 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[152]  arXiv:2012.10825 [pdf, ps, other]
Title: Hashcashed Reputation with Application in Designing Watchtowers
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2012.10832 [pdf, other]
Title: AWA: Adversarial Website Adaptation
Comments: 15 pages, 7 figures, and 2 tables. Accepted in IEEE Transactions on Information Forensics and Security (TIFS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[154]  arXiv:2012.10876 [src]
Title: Concrete Evaluation of the Random Probing Security
Comments: V. Jahandideh had an issue with his affiliation, and the other two did not want to be part of the project
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2012.11072 [src]
Title: A Secured Protocol for IoT Networks
Comments: Implementation was never carrier out with the proposed algorithms. The implementation discussed is based on earlier algorithms
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2012.11097 [pdf, other]
Title: DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
[157]  arXiv:2012.11206 [pdf]
Title: Edge Computing in Transportation: Security Issues and Challenges
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2012.11223 [pdf, other]
Title: FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs
Comments: 4 pages
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[159]  arXiv:2012.11325 [pdf, other]
Title: Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Comments: 4 pages, 2 figures, 1 table, Accepted and presented at IEEE 32nd International Conference on Microelectronics (IEEE-ICM2020)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[160]  arXiv:2012.11326 [pdf, other]
Title: Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Comments: 4 pages, 3 figures, 1 table, Accepted and presented in IEEE 32nd International Conference on Microelectronics (IEEE-ICM2020)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[161]  arXiv:2012.11358 [pdf, other]
Title: Reconfigurable Integrated Optical Interferometer Network-Based Physically Unclonable Function
Journal-ref: Journal of Lightwave Technology, vol. 38, no. 17, pp. 4599-4606, 1 Sept.1, 2020
Subjects: Cryptography and Security (cs.CR); Optics (physics.optics); Quantum Physics (quant-ph)
[162]  arXiv:2012.11375 [pdf]
Title: Effectiveness of SCADA System Security Used Within Critical Infrastructure
Authors: Joshua Taylor
Subjects: Cryptography and Security (cs.CR)
[163]  arXiv:2012.11541 [pdf, other]
Title: Privacy Interpretation of Behavioural-based Anomaly Detection Approaches
Comments: 19 Pages
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2012.11699 [pdf, other]
Title: A Vulnerability Study on Academic Collaboration Networks Based on Network Dynamics
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[165]  arXiv:2012.11701 [pdf, other]
Title: Learning from What We Know: How to Perform Vulnerability Prediction using Noisy Historical Data
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[166]  arXiv:2012.12060 [pdf, other]
Title: Information Leakage Games: Exploring Information as a Utility Function
Comments: The journal version of GameSec'17 paper (arXiv:1705.05030), accepted in ACM Transactions on Privacy and Security (TOPS)
Journal-ref: ACM Trans. Priv. Secur. 25, 3, Article 20 (August 2022), pp. 1-36
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); Theoretical Economics (econ.TH)
[167]  arXiv:2012.12518 [pdf, ps, other]
Title: If This Context Then That Concern: Exploring users' concerns with IFTTT applets
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2012.12529 [pdf, other]
Title: SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2012.12603 [pdf, other]
Title: Flexible Software Protection
Comments: Submitted to ACM Transactions on Privacy and Security
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2012.12743 [pdf, other]
Title: Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks
Authors: Qingtian Zou (1), Anoop Singhal (2), Xiaoyan Sun (3), Peng Liu (1) ((1) The Pennsylvania State University, (2) National Institute of Standards and Technology, (3) California State University, Sacramento)
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2012.12835 [pdf, other]
Title: Enabling Secure and Effective Biomedical Data Sharing through Cyberinfrastructure Gateways
Comments: Presented at Gateways 2020, Online, USA, October 2020, see this https URL
Subjects: Cryptography and Security (cs.CR)
[172]  arXiv:2012.12958 [pdf]
Title: Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges
Comments: 42 pages, 15 figures and 4 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[173]  arXiv:2012.13053 [pdf, other]
Title: Function Secret Sharing for PSI-CA:With Applications to Private Contact Tracing
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2012.13225 [pdf, other]
Title: Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
Subjects: Cryptography and Security (cs.CR)
[175]  arXiv:2012.13230 [pdf, ps, other]
Title: SoK: Lending Pools in Decentralized Finance
Comments: 20 pages. Under submission
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); General Finance (q-fin.GN)
[ total of 308 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)