Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2020

Total of 243 entries : 1-25 51-75 76-100 101-125 126-150 151-175 176-200 201-225 ... 226-243
Showing up to 25 entries per page: fewer | more | all
[126] arXiv:2001.09090 [pdf, other]
Title: A Cloud Security Framework Based on Trust Model and Mobile Agent
Saddek Benabied, Abdelhafid Zitouni (LIRE), Mahieddine Djoudi (TECHNÉ - EA 6316)
Journal-ref: 2015 International Conference on Cloud Technologies and Applications (CloudTech), Jun 2015, Marrakech, France. pp.1-8
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[127] arXiv:2001.09100 [pdf, other]
Title: Why Temporal Persistence of Biometric Features is so Valuable for Classification Performance
Lee Friedman, Hal Stern, Larry R. Price, Oleg V. Komogortsev
Comments: 19 pages, 8 figures, 7 tables, 2 Appendices
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:2001.09170 [pdf, other]
Title: Software-Defined Location Privacy Protection for Vehicular Networks
Abdelwahab Boualouache, Ridha Soua, Thomas Engel
Subjects: Cryptography and Security (cs.CR)
[129] arXiv:2001.09183 [pdf, other]
Title: An Overview of Fingerprint-Based Authentication: Liveness Detection and Beyond
Filipp Demenschonok, Jason Harrigan, Tamara Bonaci
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Robotics (cs.RO)
[130] arXiv:2001.09259 [pdf, other]
Title: A Blockchain-Based Approach for Saving and Tracking Differential-Privacy Cost
Yang Zhao, Jun Zhao, Jiawen Kang, Zehang Zhang, Dusit Niyato, Shuyu Shi
Comments: 14 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[131] arXiv:2001.09273 [pdf, other]
Title: An Immunology-Inspired Network Security Architecture
Quan Yu, Jing Ren, Jiyan Zhang, Siyang Liu, Yinjin Fu, Ying Li, Linru Ma, Jian Jing, Wei Zhang
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2001.09388 [pdf, other]
Title: AI-Powered GUI Attack and Its Defensive Methods
Ning Yu, Zachary Tuttle, Carl Jake Thurnau, Emmanuel Mireku
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[133] arXiv:2001.09406 [pdf, other]
Title: A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks
Milad Taleby Ahvanooey, Qianmu Li, Mahdi Rabbani, Ahmed Raza Rajput
Comments: 16 pages, 9 figures, International Journal of Advanced Computer Science and Applications
Journal-ref: International Journal of Advanced Computer Science and Applications, 8(10), p.2017
Subjects: Cryptography and Security (cs.CR)
[134] arXiv:2001.09461 [pdf, other]
Title: The SPECIAL-K Personal Data Processing Transparency and Compliance Platform
Sabrina Kirrane, Javier D. Fernández, Piero Bonatti, Uros Milosevic, Axel Polleres, Rigo Wenning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[135] arXiv:2001.09555 [pdf, other]
Title: Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data
Emre Yilmaz, Erman Ayday
Subjects: Cryptography and Security (cs.CR)
[136] arXiv:2001.09592 [pdf, other]
Title: Finding Security Vulnerabilities in Network Protocol Implementations
Kaled Alshmrany, Lucas Cordeiro
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[137] arXiv:2001.09624 [pdf, other]
Title: SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles
Jiasi Weng, Jian Weng, Yue Zhang, Ming Li, Zhaodi Wen
Subjects: Cryptography and Security (cs.CR)
[138] arXiv:2001.09670 [pdf, other]
Title: Distributed systems and trusted execution environments: Trade-offs and challenges
Rafael Pereira Pires
Comments: 133 pages, PhD thesis, University of Neuchâtel, Defended on December 3rd, 2019
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[139] arXiv:2001.09672 [pdf, other]
Title: Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA
Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian
Comments: To appear in DATE'20
Subjects: Cryptography and Security (cs.CR)
[140] arXiv:2001.09697 [pdf, other]
Title: Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, José Miguel-Alonso
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[141] arXiv:2001.09837 [pdf, other]
Title: Verifying Software Vulnerabilities in IoT Cryptographic Protocols
Fatimah Aljaafari, Lucas C. Cordeiro, Mustafa A. Mustafa
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[142] arXiv:2001.10248 [pdf, other]
Title: Beyond the Front Page: Measuring Third Party Dynamics in the Field
Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann
Subjects: Cryptography and Security (cs.CR)
[143] arXiv:2001.10405 [pdf, other]
Title: Language-Based Web Session Integrity
Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta
Subjects: Cryptography and Security (cs.CR)
[144] arXiv:2001.10461 [pdf, other]
Title: OAuth 2.0 authorization using blockchain-based tokens
Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris, George C. Polyzos
Comments: NDSS Workshop on Decentralized IoT Systems and Security (DISS), San Diego, CA, USA, 2020
Subjects: Cryptography and Security (cs.CR)
[145] arXiv:2001.10630 [pdf, other]
Title: First-Order Logic for Flow-Limited Authorization
Andrew K. Hirsch, Pedro H. Azevedo de Amorim, Ethan Cecchetti, Ross Tate, Owen Arden
Comments: Coq code can be found at this https URL
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Programming Languages (cs.PL)
[146] arXiv:2001.10783 [pdf, other]
Title: RSA and redactable blockchains
Dima Grigoriev, Vladimir Shpilrain
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[147] arXiv:2001.10881 [pdf, other]
Title: Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version
Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens
Comments: Extended version of the paper "Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors"
Subjects: Cryptography and Security (cs.CR)
[148] arXiv:2001.10893 [pdf, other]
Title: Privacy-Preserving Gaussian Process Regression -- A Modular Approach to the Application of Homomorphic Encryption
Peter Fenner, Edward O. Pyzer-Knapp
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[149] arXiv:2001.10916 [pdf, other]
Title: Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
William Briguglio, Sherif Saad
Comments: 18 pages, The 12th International Symposium on Foundations & Practice of Security, 2019
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[150] arXiv:2001.10999 [pdf, other]
Title: A4 : Evading Learning-based Adblockers
Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq
Comments: 10 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 243 entries : 1-25 51-75 76-100 101-125 126-150 151-175 176-200 201-225 ... 226-243
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack