We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 100

[ total of 346 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]
[101]  arXiv:2110.07366 [pdf, other]
Title: Privacy Impact Assessment: Comparing methodologies with a focus on practicality
Journal-ref: NordSec 2019. Lecture Notes in Computer Science, vol 11875. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[102]  arXiv:2110.07449 [pdf, other]
Title: zk-Fabric, a Polylithic Syntax Zero Knowledge Joint Proof System
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[103]  arXiv:2110.07450 [pdf, other]
Title: Bugs in our Pockets: The Risks of Client-Side Scanning
Comments: 46 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[104]  arXiv:2110.07462 [pdf, other]
Title: On Adversarial Vulnerability of PHM algorithms: An Initial Study
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[105]  arXiv:2110.07505 [pdf, other]
Title: AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy
Comments: To Appear in the ACM Conference on Computer and Communications Security (CCS) 2021
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2110.07534 [pdf, other]
Title: Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2110.07771 [pdf, other]
Title: Assessing Risks and Modeling Threats in the Internet of Things
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[108]  arXiv:2110.07826 [pdf]
Title: Machine Learning Algorithms In User Authentication Schemes
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[109]  arXiv:2110.07832 [pdf]
Title: A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2110.07954 [pdf, other]
Title: HTTPA: HTTPS Attestable Protocol
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[111]  arXiv:2110.08113 [pdf, other]
Title: Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2110.08139 [pdf, other]
Title: Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Comments: Accepted on 3 Sept 2021 to appear at the Network and Distributed System Security Symposium (NDSS) 2022
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2110.08177 [pdf, other]
Title: The Privacy-preserving Padding Problem: Non-negative Mechanisms for Conservative Answers with Differential Privacy
Comments: 20 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2110.08247 [pdf, other]
Title: Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks
Comments: Work in progress
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[115]  arXiv:2110.08324 [pdf, other]
Title: Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116]  arXiv:2110.08422 [pdf, other]
Title: Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
Journal-ref: Proceedings of the Privacy Enhancing Technologies Symposium (PoPETS), volume 2022, issue 1
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2110.08447 [pdf, other]
Title: TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
Authors: Chandramouli Amarnath (Georgia Tech), Aishwarya H. Balwani (Georgia Tech), Kwondo Ma (Georgia Tech), Abhijit Chatterjee (Georgia Tech)
Comments: 10 pages, 2 reference pages, 2 appendix pages, 14 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[118]  arXiv:2110.08517 [pdf, other]
Title: Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services
Journal-ref: Annual Computer Security Applications Conference (ACSAC '21), December 6--10, 2021, USA
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2110.08662 [pdf, other]
Title: An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2110.08671 [pdf, other]
Title: Blockchain and Federated Edge Learning for Privacy-Preserving Mobile Crowdsensing
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[121]  arXiv:2110.08673 [pdf, other]
Title: Scaling Blockchains: Can Elected Committees Help?
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); General Economics (econ.GN); Trading and Market Microstructure (q-fin.TR)
[122]  arXiv:2110.08697 [pdf, other]
Title: Improving Dither Modulation based Robust Steganography by Overflow Suppression
Comments: submitted to IEEE TDSC on 18-Mar-2021
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2110.08777 [pdf]
Title: A Novel Watermarking Approach for Protecting Image Integrity based on a Hybrid Security Technique
Comments: 9 pages, 4 figures, 4 tables, International Journal of Computer Applications, Vol. 178, No.30, 14-22 July 2019, ISSN 0975-8887
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2110.08779 [pdf]
Title: A robust watermarking algorithm for medical images
Comments: 12 pages, 13 figures, 5 tables, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 20, No. 3, December 2020, pp. 1601~1612, ISSN: 2502-4752, pp1601-1612
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2110.08848 [pdf, other]
Title: HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[126]  arXiv:2110.08883 [pdf, other]
Title: Blockchain Enabled Secure Authentication for Unmanned Aircraft Systems
Comments: Accepted for publication in IEEE GlobalCom as a workshop paper
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[127]  arXiv:2110.08971 [pdf, other]
Title: Long Passphrases: Potentials and Limits
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2110.09160 [pdf, other]
Title: DE-RSTC: A rational secure two-party computation protocol based on direction entropy
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2110.09162 [pdf, other]
Title: Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
Comments: To be published in Proceedings of 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[130]  arXiv:2110.09207 [pdf, other]
Title: SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay
Comments: 9 pages, 14 figures, IEEE Conference on Communications and Network Security October 2021
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2110.09519 [pdf]
Title: Protection of the patient data against intentional attacks using a hybrid robust watermarking code
Comments: 21 pages, 14 figures, 7 tables, PeerJ Computer Science, ISSN: 2376-5992 , indexed by Scopus (Impact Factor 3.67, Cite Score 6.7, SNIP 2.341, Scimago Ranking 1.601, Q1 Computer scince). this https URL
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2110.09520 [pdf]
Title: Image Protection against Forgery and Pixel Tampering based on a Triple Hybrid Security Approach
Comments: 10 pages, 5 figures, 4 tables, (AISC, Vol. 1058), The 5th International Conference on Advanced Intelligent Systems and Informatics 2019, AISI2019. Advances in Intelligent Systems and Computing, Vol. 1058. Springer, Cham. p.p 588-597, ISSN 2194-5357, ISSN 2194-5365 (electronic) and Scopus. Online ISBN: 978-3-030-311292, this https URL
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2110.09557 [pdf, other]
Title: On-the-fly Code Activation for Attack Surface Reduction
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2110.09580 [pdf, other]
Title: Flexible Accuracy for Differential Privacy
Comments: 42 pages
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2110.09615 [pdf, other]
Title: A Generalised Logical Layered Architecture for Blockchain Technology
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[136]  arXiv:2110.09635 [pdf, other]
Title: A ground-truth dataset of real security patches
Authors: Sofia Reis, Rui Abreu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[137]  arXiv:2110.09654 [pdf, other]
Title: Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
Comments: 22 Pages
Journal-ref: Information Systems Frontiers, Vol. 23, No. 4, p. 835, 2021
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2110.09714 [pdf, other]
Title: Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Comments: A version of this paper appears in the proceedings of the 28th ACM Conference on Computer and Communications Security (CCS 2021). The notes in Tables 1 and 4 have been updated
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[139]  arXiv:2110.09733 [pdf, ps, other]
Title: Franchised Quantum Money
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[140]  arXiv:2110.09857 [pdf, other]
Title: Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain
Comments: To appear in the IEEE International Conference on Blockchain (Blockchain 2021), Melbourne, Australia
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Computer Science and Game Theory (cs.GT)
[141]  arXiv:2110.10037 [pdf, ps, other]
Title: Java Card Virtual Machine Memory Organization: a Design Proposal
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2110.10086 [pdf, ps, other]
Title: Three Attacks on Proof-of-Stake Ethereum
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2110.10129 [pdf, other]
Title: Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2110.10291 [pdf, other]
Title: A Deeper Look into RowHammer`s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses
Comments: A shorter version of this work is to appear at the 54th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-54), 2021
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[145]  arXiv:2110.10354 [pdf, other]
Title: Detecting Backdoor Attacks Against Point Cloud Classifiers
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[146]  arXiv:2110.10396 [pdf, other]
Title: UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services
Authors: Chengqian Guo (1, 2 and 4), Jingqiang Lin (3), Quanwei Cai (1, 2 and 4), Fengjun Li (5), Qiongxiao Wang (1, 2 and 4), Jiwu Jing (4), Bin Zhao (6), Wei Wang (1, 2 and 4) ((1) State Key Laboratory of Information Security, Institute of Information Engineering, CAS, (2) Data Assurance and Communication Security Research Center, CAS, (3) School of Cyber Security, University of Science and Technology of China, (4) School of Cyber Security, University of Chinese Academy of Sciences (5) University of Kansas, (6) JD.com Silicon Valley R&D Center)
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2110.10418 [pdf, other]
Title: Steganography of Complex Networks
Authors: Daewon Lee
Comments: 16 pages, 6 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[148]  arXiv:2110.10493 [pdf, ps, other]
Title: On the Effectiveness of Clone Detection for Detecting IoT-related Vulnerable Clones
Comments: 7 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[149]  arXiv:2110.10540 [pdf, other]
Title: On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2110.10567 [pdf, other]
Title: Fingerprint recognition with embedded presentation attacks detection: are we ready?
Journal-ref: IEEE Transactions on Information Forensics and Security (2021)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 346 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | 251-300 | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2207, contact, help  (Access key information)