We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 25

[ total of 308 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]
[26]  arXiv:2012.01983 [pdf, other]
Title: Detection of False-Reading Attacks in the AMI Net-Metering System
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2012.01987 [pdf, ps, other]
Title: SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation
Journal-ref: The 15th International ARES Conference on Availability, Reliability and Security, August 25--28, 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[28]  arXiv:2012.02147 [pdf]
Title: The Application of Blockchain-Based Crypto Assets for Integrating the Physical and Financial Supply Chains in the Construction & Engineering Industry
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29]  arXiv:2012.02242 [pdf]
Title: A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem
Comments: 24 pages, 11 figures, 6 tables
Journal-ref: Int J Commun Syst. 2020;e4693
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[30]  arXiv:2012.02494 [pdf, other]
Title: LSB Steganography Using Pixel Locator Sequence with AES
Comments: 5 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2012.02511 [pdf]
Title: Threats to the information system in the physical environment and cyberspace
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2012.02554 [pdf, other]
Title: Automating Seccomp Filter Generation for Linux Applications
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2012.02586 [pdf, other]
Title: TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic
Comments: Accepted for publication at NSPW 2020
Journal-ref: New Security Paradigms Workshop (NSPW) 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[34]  arXiv:2012.02606 [pdf, other]
Title: TrollHunter2020: Real-Time Detection of Trolling Narratives on Twitter During the 2020 US Elections
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[35]  arXiv:2012.02644 [pdf, other]
Title: A Survey on Blockchain & Cloud Integration
Comments: Accepted for publication in the 23rd International Conference on Computer and Information Technology (ICCIT), 2020
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2012.02670 [pdf, other]
Title: Unleashing the Tiger: Inference Attacks on Split Learning
Comments: ACM Conference on Computer and Communications Security 2021 (CCS21)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2012.02675 [pdf, other]
Title: Resilience-by-design in Adaptive Multi-Agent Traffic Control Systems
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2012.02715 [pdf, other]
Title: Efficient Sealable Protection Keys for RISC-V
Comments: 7 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[39]  arXiv:2012.02745 [pdf, other]
Title: Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
Comments: Accepted at Annual Computer Security Applications Conference (ACSAC 2020), December 7-11, 2020, Austin, USA. ACM, New York, NY, USA, 13 pages, ACM ISBN 978-1-4503-8858-0/20/12 Artifact available: this https URL
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2012.02848 [pdf, other]
Title: Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Comments: arXiv admin note: substantial text overlap with arXiv:2005.10429
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2012.02865 [pdf]
Title: Hybrid Chaotic Method for Medical Images Ciphering
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) Vol.12, No.6, November 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[42]  arXiv:2012.02885 [pdf, other]
Title: Verifiable Proof of Health using Public Key Cryptography
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[43]  arXiv:2012.02891 [pdf, other]
Title: Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Comments: IEEE Latin-American Conference on Communications (LATINCOM) 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44]  arXiv:2012.03141 [pdf, other]
Title: Automated Symbolic Verification of Telegram's MTProto 2.0
Comments: 19 pages
Journal-ref: In "Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021". ISBN 978-989-758-524-1, pages 185-197
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2012.03162 [pdf, other]
Title: MeLPUF: Memory in Logic PUF
Comments: 5 pages, 16 figures
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2012.03165 [pdf, other]
Title: Security and Privacy for Mobile Edge Caching: Challenges and Solutions
Comments: This article has been accepted by IEEE Wireless Communications Magazine
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[47]  arXiv:2012.03283 [pdf, other]
Title: On the Privacy and Integrity Risks of Contact-Tracing Applications
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[48]  arXiv:2012.03371 [pdf, other]
Title: More style, less work: card-style data decrease risk-limiting audit sample sizes
Comments: 19 pages, 9 figures. In submission at Digital Threats: Research and Practice
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[49]  arXiv:2012.03386 [pdf, other]
Title: SoK: Training Machine Learning Models over Multiple Sources with Privacy Preservation
Comments: 17 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2012.03404 [pdf, other]
Title: Black-box Model Inversion Attribute Inference Attacks on Classification Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 308 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2205, contact, help  (Access key information)