Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2020

Total of 353 entries : 1-25 26-50 51-75 76-100 ... 351-353
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:2006.00076 [pdf, other]
Title: Fast Execute-Only Memory for Embedded Systems
Zhuojia Shen, Komail Dharsee, John Criswell
Comments: 8 pages, 6 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:2006.00165 [pdf, other]
Title: Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber Physical Systems
Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi
Comments: Preprint version of the published paper
Journal-ref: IEEE Transactions on Reliability, VOL. 71, NO. 2, JUNE 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[3] arXiv:2006.00505 [pdf, other]
Title: Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference
Brandon Reagen, Wooseok Choi, Yeongil Ko, Vincent Lee, Gu-Yeon Wei, Hsien-Hsin S. Lee, David Brooks
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2006.00514 [pdf, other]
Title: New Code-Based Cryptosystem with Arbitrary Error Vectors
Fedor Ivanov, Eugenii Krouk
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2006.00529 [pdf, other]
Title: A review of information security aspects of the emerging COVID-19 contact tracing mobile phone applications
Georgios Magklaras, Lucia Nikolaia Lopez Bojorquez
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[6] arXiv:2006.00548 [pdf, other]
Title: Evaluation of biometric user authentication using an ensemble classifier with face and voice recognition
Firas Abbaas, Gursel Serpen
Comments: 11 pages, 8 Figures and 14 Tables. Accepted for publication in Journal of Information Assurance and Security
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:2006.00577 [pdf, other]
Title: Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them
Alessandro Ecclesie Agazzi
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[8] arXiv:2006.00653 [pdf, other]
Title: The QQUIC Transport Protocol: Quantum assisted UDP Internet Connections
Peng Yan, Nengkun Yu
Comments: Comments are welcome
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Quantum Physics (quant-ph)
[9] arXiv:2006.00676 [pdf, other]
Title: G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System
Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Miguel Alonso Jr
Comments: 10 pages, 4 figures, accepted in IEEE COMPSAC-2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[10] arXiv:2006.00790 [pdf, other]
Title: Smartphone Sensors for Modeling Human-Computer Interaction: General Outlook and Research Datasets for User Authentication
Alejandro Acien, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez
Journal-ref: IEEE Intl. Workshop on Consumer Devices and Systems (CDS), 2020, Madrid, Spain
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2006.00860 [pdf, other]
Title: Adversarial Attacks on Classifiers for Eye-based User Modelling
Inken Hagestedt (1), Michael Backes (1), Andreas Bulling (2) ((1) CISPA Helmholtz Center for Information Security, (2) University of Stuttgart)
Comments: 9 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[12] arXiv:2006.01043 [pdf, other]
Title: BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements
Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang
Comments: To appear in Annual Computer Security Applications Conference (ACSAC) 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13] arXiv:2006.01072 [pdf, other]
Title: GHAST: Breaking Confirmation Delay Barrier in Nakamoto Consensus via Adaptive Weighted Blocks
Chenxing Li, Fan Long, Guang Yang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[14] arXiv:2006.01181 [pdf, other]
Title: Security Smells in Android
Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz
Comments: 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[15] arXiv:2006.01264 [pdf, other]
Title: An End-to-End Encryption Solution for Enterprise Content Applications
Chaoting Xuan
Comments: 6 pages (includes references)
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:2006.01300 [pdf, other]
Title: DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks
Hanieh Hashemi, Yongqin Wang, Murali Annavaram
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2006.01342 [pdf, other]
Title: A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks
Warit Sirichotedumrong, Hitoshi Kiya
Comments: To be appeared on 28th European Signal Processing Conference (EUSIPCO 2020)
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[18] arXiv:2006.01418 [pdf, other]
Title: Time-Dilation Attacks on the Lightning Network
Antoine Riard, Gleb Naumenko
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2006.01427 [pdf, other]
Title: LaKSA: A Probabilistic Proof-of-Stake Protocol
Daniel Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2006.01442 [pdf, other]
Title: Real time Detection of Spectre and Meltdown Attacks Using Machine Learning
Bilal Ali Ahmad
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2006.01449 [pdf, other]
Title: Less is More: Robust and Novel Features for Malicious Domain Detection
Chen Hajaj, Nitay Hason, Nissim Harel, Amit Dvir
Comments: 30 pages, 7 figures, 10 tables
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:2006.01607 [pdf, other]
Title: Probability theory and public-key cryptography
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2006.01722 [pdf, other]
Title: Threat Detection and Investigation with System-level Provenance Graphs: A Survey
Zhenyuan Li, Qi Alfred Chen, Runqing Yang, Yan Chen
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:2006.01751 [pdf, other]
Title: MusicID: A Brainwave-based User Authentication System for Internet of Things
Jinani Sooriyaarachchi, Suranga Seneviratne, Kanchana Thilakarathna, Albert Y. Zomaya
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[25] arXiv:2006.01818 [pdf, other]
Title: Securing Your Collaborative Jupyter Notebooks in the Cloud using Container and Load Balancing Services
Haw-minn Lu, Adrian Kwong, Jose Unpingco
Comments: Accepted and submitted to 19th Python in Science Conference. (SciPy 2020)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
Total of 353 entries : 1-25 26-50 51-75 76-100 ... 351-353
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack