Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2020

Total of 243 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-175 ... 226-243
Showing up to 25 entries per page: fewer | more | all
[76] arXiv:2001.06203 [pdf, other]
Title: Low-Cost Anti-Copying 2D Barcode by Exploiting Channel Noise Characteristics
Ning Xie (Senior Member, IEEE), Qiqi Zhang, Ji Hu, Gang Luo, Changsheng Chen (Member, IEEE)
Subjects: Cryptography and Security (cs.CR)
[77] arXiv:2001.06238 [pdf, other]
Title: Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication
Linda Senigagliesi, Marco Baldi, Ennio Gambi
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[78] arXiv:2001.06443 [pdf, other]
Title: Scaling VANET Security Through Cooperative Message Verification
Hongyu Jin, Panos Papadimitratos
Comments: 2015 IEEE Vehicular Networking Conference (VNC), Kyoto, 2015
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[79] arXiv:2001.06476 [pdf, other]
Title: LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection
Ashkan Vakil, Farnaz Behnia, Ali Mirzaeian, Houman Homayoun, Naghmeh Karimi, Avesta Sasan
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:2001.06519 [pdf, other]
Title: On Scheduler Side-Channels in Dynamic-Priority Real-Time Systems
Chien-Ying Chen, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:2001.06616 [pdf, other]
Title: Research Directions in Cyber Threat Intelligence
Stjepan Groš
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:2001.06681 [pdf, other]
Title: Automating the Generation of Cyber Range Virtual Scenarios with VSDL
Gabriele Costa, Enrico Russo, Alessandro Armando
Journal-ref: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 13 (2022) 61-80
Subjects: Cryptography and Security (cs.CR)
[83] arXiv:2001.06724 [pdf, other]
Title: DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys
Nimisha Limaye, Ozgur Sinanoglu
Comments: Accepted at Design, Automation and Test in Europe Conference (DATE) 2020
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:2001.06729 [pdf, other]
Title: Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers
Zhihui Shao, Mohammad A. Islam, Shaolei Ren
Comments: 23 pages, 40 figures, to be presented at ACM SIGMETRICS, June 08~12, 2020, Boston, MA
Subjects: Cryptography and Security (cs.CR)
[85] arXiv:2001.06909 [pdf, other]
Title: Wallet Contracts on Ethereum -- Identification, Types, Usage, and Profiles
Monika di Angelo, Gernot Salzer
Subjects: Cryptography and Security (cs.CR)
[86] arXiv:2001.06920 [pdf, other]
Title: DoS-resilient Cooperative Beacon Verification for Vehicular Communication Systems
Hongyu Jin, Panos Papadimitratos
Journal-ref: Elsevier Ad Hoc Networks, 90, 101775, 2019
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2001.06932 [pdf, other]
Title: Covert Communication in Continuous-Time Systems
Ke Li, Don Towsley, Dennis Goeckel
Comments: 8 pages, 5 figures, concise version submitted to 2020 IEEE International Symposium on Information Theory (ISIT)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[88] arXiv:2001.07016 [pdf, other]
Title: BlockHouse: Blockchain-based Distributed Storehouse System
Doriane Perard, Lucas Gicquel, Jérôme Lacan
Comments: Published in "9TH Latin-American Symposium on Dependable Computing", 2019
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[89] arXiv:2001.07023 [pdf, other]
Title: Segment blockchain: A size reduced storage mechanism for blockchain
Yibin Xu, Yangyu Huang
Journal-ref: IEEE Access,2020. https://ieeexplore.ieee.org/document/8957450/
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[90] arXiv:2001.07157 [pdf, other]
Title: On the Feasibility of Acoustic Attacks Using Commodity Smart Devices
Matt Wixey, Shane Johnson, Emiliano De Cristofaro
Subjects: Cryptography and Security (cs.CR)
[91] arXiv:2001.07162 [pdf, other]
Title: Authenticated Secret Key Generation in Delay Constrained Wireless Systems
Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:2001.07170 [pdf, other]
Title: Hide Me: Enabling Location Privacy in Heterogeneous Vehicular Networks
Tobias Meuser, Oluwasegun Taiwo Ojo, Daniel Bischoff, Antonio Fernández Anta, Ioannis Stavrakakis, Ralf Steinmetz
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[93] arXiv:2001.07179 [pdf, other]
Title: A Secure and Smart Framework for Preventing Ransomware Attack
Jaspreet Kaur (1) ((1) PhD Scholar at CSE Department, Indian Institute of Technology Jodhpur, Jodhpur, India)
Comments: Accepted in 8th N2Women workshop in conjunction with ACM SenSys 2019, USA and as a poster in 27th IEEE ICNP Conference 2019, USA
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:2001.07297 [pdf, other]
Title: PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks
Deepak Puthal, Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos
Comments: 26 pages, 18 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[95] arXiv:2001.07421 [pdf, other]
Title: Information Leaks via Safari's Intelligent Tracking Prevention
Artur Janc, Krzysztof Kotowicz, Lukas Weichselbaum, Roberto Clapis
Subjects: Cryptography and Security (cs.CR)
[96] arXiv:2001.07424 [pdf, other]
Title: Investigation of Data Deletion Vulnerabilities in NAND Flash Memory Based Storage
Abhilash Garg, Supriya Chakraborty, Manoj Malik, Devesh Kumar, Satyajeet Singh, Manan Suri
Comments: 8 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[97] arXiv:2001.07534 [pdf, other]
Title: VeSPA: Vehicular Security and Privacy-preserving Architecture
Nikolaos Alexiou, Marcello Laganà, Stylianos Gisdakis, Mohammad Khodaei, Panagiotis Papadimitratos
Comments: 5 pages, 2 figures, HotWiSec'13: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, April 2013
Subjects: Cryptography and Security (cs.CR)
[98] arXiv:2001.07583 [pdf, other]
Title: Resilient Privacy Protection for Location-Based Services through Decentralization
Hongyu Jin, Panos Papadimitratos
Comments: Version 1 of this article is the conference version
Journal-ref: ACM Transactions on Privacy and Security (TOPS), 22(4), 21:1-36, 2019
Subjects: Cryptography and Security (cs.CR)
[99] arXiv:2001.07585 [pdf, other]
Title: Proactive Certificate Validation for VANETs
Hongyu Jin, Panos Papadimitratos
Journal-ref: 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, 2016
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:2001.07586 [pdf, other]
Title: Resilient Collaborative Privacy for Location-Based Services
Hongyu Jin, Panos Papadimitratos
Journal-ref: Nordic Conference on Secure IT Systems (NordSec), Stockholm, Sweden, Oct. 2015
Subjects: Cryptography and Security (cs.CR)
Total of 243 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-175 ... 226-243
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack