Mirror operated in collaboration with local support

Cryptography and Security

Authors and titles for recent submissions

[ total of 80 entries: 1-25 | 26-50 | 51-75 | 76-80 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 21 May 2020

[1]  arXiv:2005.10083 [pdf]
Title: Securing Digital Systems via Split-Chip Obfuscation
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2005.09800 [pdf, other]
Title: Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
Journal-ref: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8--10, 2020, Linz (Virtual Event), Austria
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2005.09790 [pdf, other]
Title: Layer 2 Atomic Cross-Blockchain Function Calls
Comments: 8 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2005.09714 [pdf, other]
Title: The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things
Comments: In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS 20)
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2005.10203 (cross-list from cs.LG) [pdf, other]
Title: Graph Structure Learning for Robust Graph Neural Networks
Comments: Accepted by KDD 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
[6]  arXiv:2005.10103 (cross-list from cs.DC) [pdf, other]
Title: BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Wed, 20 May 2020 (showing first 19 of 21 entries)

[7]  arXiv:2005.09610 [pdf, other]
Title: Free2Shard: Adaptive-adversary-resistant sharding via Dynamic Self Allocation
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT)
[8]  arXiv:2005.09563 [pdf, other]
[9]  arXiv:2005.09535 [pdf, other]
Title: Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks
Comments: This is a pre-print version of the paper that appears in the proceedings of The 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[10]  arXiv:2005.09532 [pdf, other]
Title: Scalable Privacy-Preserving Distributed Learning
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2005.09443 [pdf, other]
Title: Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2005.09413 [pdf, ps, other]
Title: The Privacy ZEBRA: Zero Evidence Biometric Recognition Assessment
Comments: submitted to Interspeech 2020
Subjects: Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[13]  arXiv:2005.09353 [pdf, other]
Title: "Guess Who ?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2005.09327 [pdf, other]
Title: Griefing-Penalty: Countermeasure for Griefing Attack in Bitcoin-compatible PCNs
Comments: 26 pages, 9 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2005.09258 [pdf, ps, other]
Title: Cryptanalysis of ITRU
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2005.09244 [pdf, ps, other]
Title: A Faster Cryptographer's Conspiracy Santa
Authors: Xavier Bultel (LIFO), Jannik Dreier (PESTO), Jean-Guillaume Dumas (CASC), Pascal Lafourcade (LIMOS)
Journal-ref: Theoretical Computer Science, Elsevier, In press
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2005.09199 [pdf, other]
Title: FrameProv: Towards End-To-End Video Provenance
Journal-ref: New Security Paradigms Workshop, 2019
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Multimedia (cs.MM)
[18]  arXiv:2005.09140 [pdf]
Title: SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
Comments: 26 pages, 11 figures, 10 tables, Wireless Pers Commun (2020)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[19]  arXiv:2005.09107 [pdf]
Title: NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2005.09042 [pdf, other]
Title: BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Comments: The Network and Distributed System Security Symposium (NDSS) 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2005.09039 [pdf, other]
Title: DALock: Distribution Aware Password Throttling
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[22]  arXiv:2005.08997 [pdf, other]
Title: VerifyTL: Secure and Verifiable Collaborative Transfer Learning
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2005.09516 (cross-list from cs.PL) [pdf, other]
Title: RIOT-POLICE: An implementation of spatial memory safety for the RIOT operating system
Authors: Sören Tempel (University of Bremen), Tristan Bruns (University of Bremen)
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[24]  arXiv:2005.09503 (cross-list from eess.SP) [pdf, ps, other]
Title: Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM
Comments: 14 pages, 23 figures and sub-figures, Submitted to the IEEE Internet of Things Journal on May 19, 2020
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2005.09402 (cross-list from math.NT) [pdf, ps, other]
Title: The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace
Comments: 12 pages. Comments are welcome
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[ total of 80 entries: 1-25 | 26-50 | 51-75 | 76-80 ]
[ showing 25 entries per page: fewer | more | all ]