Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2020

Total of 243 entries : 1-25 26-50 51-75 76-100 ... 226-243
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:2001.00195 [pdf, other]
Title: Web APIs in Android through the Lens of Security
Pascal Gadient, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz
Comments: 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). London, Ontario, Canada, February 18-21, 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[2] arXiv:2001.00226 [pdf, other]
Title: With Great Power Comes Great Responsibility: Utilizing Privacy Technology for the Greater Bad
Sarah Cline, Jacob Aronoff
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:2001.00486 [pdf, other]
Title: Reparo: Publicly Verifiable Layer to Repair Blockchains
Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate
Comments: Appeared in Financial Cryptography 2021 (this https URL)
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2001.00493 [pdf, other]
Title: Privacy for Rescue: A New Testimony Why Privacy is Vulnerable In Deep Models
Ruiyuan Gao, Ming Dun, Hailong Yang, Zhongzhi Luan, Depei Qian
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5] arXiv:2001.00515 [pdf, other]
Title: Key-dependent Security of Stream Ciphers
Eric Filiol
Comments: 11 pages + 1 figure. This work has been presented in two parts at the Kaz'Hack'Stan 2019 conference in Nur-Sultan, Kazakhstan and at BSides Lisbon 2019, Lisbon, Portugal
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:2001.00522 [pdf, other]
Title: Schemes for Privacy Data Destruction in a NAND Flash Memory
Na-Young Ahn, Dong Hoon Lee
Comments: Pages 181305 - 181313
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Systems and Control (eess.SY)
[7] arXiv:2001.00694 [pdf, other]
Title: Differentially Private Combinatorial Cloud Auction
Tianjiao Ni, Zhili Chen, Lin Chen, Hong Zhong, Shun Zhang, Yan Xu
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:2001.00747 [pdf, other]
Title: Improving PKI, BGP, and DNS Using Blockchain: A Systematic Review
Faizan Safdar Ali, Alptekin Kupcu
Comments: 6 Pages, 2 Figures, ISC Turkey
Journal-ref: https://www.iscturkey.org/, 2019
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[9] arXiv:2001.00771 [pdf, other]
Title: Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain
Zhili Chen, Wei Ding, Yan Xu, Miaomiao Tian, Hong Zhong
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:2001.00806 [pdf, other]
Title: Verifying Cryptographic Security Implementations in C Using Automated Model Extraction
Mihhail Aizatulin
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[11] arXiv:2001.00916 [pdf, other]
Title: Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
Zakaria El Mrabet, Mehdi Ezzari, Hassan Elghazi, Badr Abou El Majd
Comments: 7 pages, 6 figures. 2019 NISS19: Proceedings of the 2nd International Conference on Networking, Information Systems & Security
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
[12] arXiv:2001.00917 [pdf, other]
Title: A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid
Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch
Comments: 6 pages, 6 Figures
Journal-ref: 2019 IEEE International Conference on Electro Information Technology (EIT)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
[13] arXiv:2001.01071 [pdf, other]
Title: DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Sheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori
Comments: Accepted to be Published in: Proceedings of the 2019 5th IEEE International Symposium on Smart Electronic Systems (IEEE-iSES), Dec. 16-18, 2019, Rourkela, India
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:2001.01128 [pdf, other]
Title: Locality-Sensitive Hashing for Efficient Web Application Security Testing
Ilan Ben-Bassat, Erez Rokah
Journal-ref: In Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP), pages 193-204 (2019)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[15] arXiv:2001.01202 [pdf, other]
Title: Deep Face Representations for Differential Morphing Attack Detection
Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:2001.01204 [pdf, other]
Title: Covert Association of Applications on Edge Devices by Processor Workload
Hangtai Li, Yingbo Liu, Rui Tan
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2001.01278 [pdf, other]
Title: Snappy: Fast On-chain Payments with Practical Collaterals
Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun
Comments: Network and Distributed Systems Security (NDSS) Symposium 2020, 23-26 February 2020, San Diego, CA, USA
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[18] arXiv:2001.01387 [pdf, other]
Title: Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems
Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2001.01525 [pdf, other]
Title: UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Xueyuan Han, Thomas Pasquier, Adam Bates, James Mickens, Margo Seltzer
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2001.01618 [pdf, other]
Title: ARA : Aggregated RAPPOR and Analysis for Centralized Differential Privacy
Sudipta Paul, Subhankar Mishra
Journal-ref: SN COMPUT. SCI. (2020) 1: 22
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[21] arXiv:2001.01659 [pdf, other]
Title: KYChain: User-Controlled KYC Data Sharing and Certification
Constantin Cătălin Drăgan, Mark Manulis
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:2001.01825 [pdf, other]
Title: Protect Edge Privacy in Path Publishing with Differential Privacy
Zhigang Lu, Hong Shen
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2001.01837 [pdf, other]
Title: Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure
Jawad Ali, Toqeer Ali, Shahrulniza Musa, Ali Zahrani
Comments: 9 pages, 4 Figures, 2 tables
Journal-ref: International Journal of Advanced Computer Sciences and Applications, Volume 9, Issue 10, 2018
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:2001.01841 [pdf, other]
Title: Towards a secure behavior modeling for IoT networks using Blockchain
Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed
Comments: 15 Pages, 6 Figures, Workshops at the Second International Conference on Applied Informatics 2019
Journal-ref: CEUR Workshop Proceedings, Volume 2486, page 244-258, 2019
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2001.01848 [pdf, other]
Title: Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu
Comments: Accepted version of our work published in IEEE Transactions on Dependable and Secure Computing (TDSC, 2021)
Subjects: Cryptography and Security (cs.CR)
Total of 243 entries : 1-25 26-50 51-75 76-100 ... 226-243
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack