1. <code id="md54j"></code>
      <big id="md54j"><em id="md54j"></em></big>

        <code id="md54j"><nobr id="md54j"><samp id="md54j"></samp></nobr></code>
        <dfn id="md54j"><option id="md54j"><sub id="md54j"></sub></option></dfn>
        1. <th id="md54j"></th>

          Mirror operated in collaboration with local support

          Cryptography and Security

          Authors and titles for recent submissions

          [ total of 80 entries: 1-25 | 26-50 | 51-75 | 76-80 ]
          [ showing 25 entries per page: fewer | more | all ]

          Thu, 21 May 2020

          [1]  arXiv:2005.10083 [pdf]
          Title: Securing Digital Systems via Split-Chip Obfuscation
          Subjects: Cryptography and Security (cs.CR)
          [2]  arXiv:2005.09800 [pdf, other]
          Title: Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
          Journal-ref: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8--10, 2020, Linz (Virtual Event), Austria
          Subjects: Cryptography and Security (cs.CR)
          [3]  arXiv:2005.09790 [pdf, other]
          Title: Layer 2 Atomic Cross-Blockchain Function Calls
          Comments: 8 pages, 5 figures
          Subjects: Cryptography and Security (cs.CR)
          [4]  arXiv:2005.09714 [pdf, other]
          Title: The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things
          Comments: In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS 20)
          Subjects: Cryptography and Security (cs.CR)
          [5]  arXiv:2005.10203 (cross-list from cs.LG) [pdf, other]
          Title: Graph Structure Learning for Robust Graph Neural Networks
          Comments: Accepted by KDD 2020
          Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
          [6]  arXiv:2005.10103 (cross-list from cs.DC) [pdf, other]
          Title: BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond
          Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

          Wed, 20 May 2020 (showing first 19 of 21 entries)

          [7]  arXiv:2005.09610 [pdf, other]
          Title: Free2Shard: Adaptive-adversary-resistant sharding via Dynamic Self Allocation
          Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT)
          [8]  arXiv:2005.09563 [pdf, other]
          [9]  arXiv:2005.09535 [pdf, other]
          Title: Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks
          Comments: This is a pre-print version of the paper that appears in the proceedings of The 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
          Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
          [10]  arXiv:2005.09532 [pdf, other]
          Title: Scalable Privacy-Preserving Distributed Learning
          Subjects: Cryptography and Security (cs.CR)
          [11]  arXiv:2005.09443 [pdf, other]
          Title: Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
          Subjects: Cryptography and Security (cs.CR)
          [12]  arXiv:2005.09413 [pdf, ps, other]
          Title: The Privacy ZEBRA: Zero Evidence Biometric Recognition Assessment
          Comments: submitted to Interspeech 2020
          Subjects: Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
          [13]  arXiv:2005.09353 [pdf, other]
          Title: "Guess Who ?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication
          Subjects: Cryptography and Security (cs.CR)
          [14]  arXiv:2005.09327 [pdf, other]
          Title: Griefing-Penalty: Countermeasure for Griefing Attack in Bitcoin-compatible PCNs
          Comments: 26 pages, 9 figures, 1 table
          Subjects: Cryptography and Security (cs.CR)
          [15]  arXiv:2005.09258 [pdf, ps, other]
          Title: Cryptanalysis of ITRU
          Subjects: Cryptography and Security (cs.CR)
          [16]  arXiv:2005.09244 [pdf, ps, other]
          Title: A Faster Cryptographer's Conspiracy Santa
          Authors: Xavier Bultel (LIFO), Jannik Dreier (PESTO), Jean-Guillaume Dumas (CASC), Pascal Lafourcade (LIMOS)
          Journal-ref: Theoretical Computer Science, Elsevier, In press
          Subjects: Cryptography and Security (cs.CR)
          [17]  arXiv:2005.09199 [pdf, other]
          Title: FrameProv: Towards End-To-End Video Provenance
          Journal-ref: New Security Paradigms Workshop, 2019
          Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Multimedia (cs.MM)
          [18]  arXiv:2005.09140 [pdf]
          Title: SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
          Comments: 26 pages, 11 figures, 10 tables, Wireless Pers Commun (2020)
          Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
          [19]  arXiv:2005.09107 [pdf]
          Title: NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
          Subjects: Cryptography and Security (cs.CR)
          [20]  arXiv:2005.09042 [pdf, other]
          Title: BLAZE: Blazing Fast Privacy-Preserving Machine Learning
          Comments: The Network and Distributed System Security Symposium (NDSS) 2020
          Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
          [21]  arXiv:2005.09039 [pdf, other]
          Title: DALock: Distribution Aware Password Throttling
          Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
          [22]  arXiv:2005.08997 [pdf, other]
          Title: VerifyTL: Secure and Verifiable Collaborative Transfer Learning
          Subjects: Cryptography and Security (cs.CR)
          [23]  arXiv:2005.09516 (cross-list from cs.PL) [pdf, other]
          Title: RIOT-POLICE: An implementation of spatial memory safety for the RIOT operating system
          Authors: Sören Tempel (University of Bremen), Tristan Bruns (University of Bremen)
          Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
          [24]  arXiv:2005.09503 (cross-list from eess.SP) [pdf, ps, other]
          Title: Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM
          Comments: 14 pages, 23 figures and sub-figures, Submitted to the IEEE Internet of Things Journal on May 19, 2020
          Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
          [25]  arXiv:2005.09402 (cross-list from math.NT) [pdf, ps, other]
          Title: The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace
          Comments: 12 pages. Comments are welcome
          Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR); Information Theory (cs.IT)
          [ total of 80 entries: 1-25 | 26-50 | 51-75 | 76-80 ]
          [ showing 25 entries per page: fewer | more | all ]
          Ϸ