Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2020

Total of 353 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-175 176-200 ... 351-353
Showing up to 25 entries per page: fewer | more | all
[101] arXiv:2006.08255 [pdf, other]
Title: ISMS role in the improvement of digital forensics related process in SOC's
Masoud Hayeri Khyavi
Comments: 8 pages, 4 figures, 1 table
Journal-ref: International Journal of Forensic Engineering and Management, January 2023
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[102] arXiv:2006.08444 [pdf, other]
Title: Taxonomy and Practical Evaluation of Primality Testing Algorithms
Anas AbuDaqa, Amjad Abu-Hassan, Muhammad Imam
Comments: 20 pages, 16 figures
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[103] arXiv:2006.08513 [pdf, other]
Title: Flood & Loot: A Systemic Attack On The Lightning Network
Jona Harris, Aviv Zohar
Subjects: Cryptography and Security (cs.CR)
[104] arXiv:2006.08524 [pdf, other]
Title: A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types
Peter Mell, Assane Gueye
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:2006.08538 [pdf, other]
Title: Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
Yan Feng, Baoyuan Wu, Yanbo Fan, Li Liu, Zhifeng Li, Shutao Xia
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[106] arXiv:2006.08598 [pdf, other]
Title: Towards practical differentially private causal graph discovery
Lun Wang, Qi Pang, Dawn Song
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[107] arXiv:2006.08604 [pdf, other]
Title: Vulnerability Coverage for Secure Configuration
Shuvalaxmi Dass, Akbar Siami Namin
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[108] arXiv:2006.08723 [pdf, other]
Title: Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems
Subrato Bharati, Prajoy Podder, M. Rubaiyat Hossain Mondal, Md. Robiul Alam Robel
Comments: 12 pages, 7 figures
Journal-ref: Journal of Information Assurance and Security (ISSN 1554-1010), Volume 15 (2020), pp. 153-164, MIR Labs, www.mirlabs.net/jias/index.html
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Signal Processing (eess.SP)
[109] arXiv:2006.08749 [pdf, other]
Title: Using Amazon Alexa APIs as a Source of Digital Evidence
Clemens Krueger, Sean McKeown
Subjects: Cryptography and Security (cs.CR)
[110] arXiv:2006.08811 [pdf, other]
Title: A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
Charles F. Gonçalves, Daniel S. Menasché, Alberto Avritzer, Nuno Antunes, Marco Vieira
Comments: 2020 Mediterranean Communication and Computer Networking Conference (MedComNet)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[111] arXiv:2006.08817 [pdf, other]
Title: BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems
Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Sun
Comments: 12 pages. arXiv admin note: substantial text overlap with arXiv:1808.00638
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:2006.08839 [pdf, other]
Title: Hash Cracking Benchmarking of Replacement Patterns
Ensar Seker
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:2006.09108 [pdf, other]
Title: An STPA-based Approach for Systematic Security Analysis of In-vehicle Diagnostic and Software Update Systems
Jinghua Yu, Stefan Wagner, Feng Luo
Comments: 6 pages, 7 figures, submitted to FISITA 2020 World Congress
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE); Systems and Control (eess.SY)
[114] arXiv:2006.09171 [pdf, other]
Title: A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs
Pengfei Gao, Hongyi Xie, Fu Song, Taolue Chen
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[115] arXiv:2006.09271 [pdf, other]
Title: A Survey of Machine Learning Methods and Challenges for Windows Malware Classification
Edward Raff, Charles Nicholas
Comments: To appear in NeurIPS 2020 Workshop: ML Retrospectives, Surveys & Meta-Analyses (ML-RSA)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP); Machine Learning (stat.ML)
[116] arXiv:2006.09272 [pdf, other]
Title: Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection
Abdallah Moubayed, Emad Aqeeli, Abdallah Shami
Comments: 6 pages, 2 figures, 6 tables, Accepted in 2020 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE 2020)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)
[117] arXiv:2006.09287 [pdf, other]
Title: Building a Collaborative Phone Blacklisting System with Local Differential Privacy
Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad
Comments: 15 pages, 10 figures, 7 algorithms
Subjects: Cryptography and Security (cs.CR)
[118] arXiv:2006.09290 [pdf, other]
Title: Novel Randomized Placement for FPGA Based Robust ROPUF with Improved Uniqueness
Arjun Singh Chauhan, Vineet Sahula, Atanendu Sekhar Mandal
Journal-ref: Journal of Electronic Testing volume 35, pages 581 to 601 (2019)
Subjects: Cryptography and Security (cs.CR)
[119] arXiv:2006.09293 [pdf, other]
Title: An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
Reza Fotohi, Eslam Nazemi, Fereidoon Shams Aliee
Comments: 35 pages, 12 figures, 14 tables, Journal
Journal-ref: Vehicular Communications. 2020 May 28:100267
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:2006.09337 [pdf, other]
Title: Fast Free-text Authentication via Instance-based Keystroke Dynamics
Blaine Ayotte, Mahesh K. Banavar, Daqing Hou, Stephanie Schuckers
Comments: Paper accepted to IEEE Transactions on Biometrics, Behavior, and Identity Science (TBIOM)
Subjects: Cryptography and Security (cs.CR)
[121] arXiv:2006.09475 [pdf, other]
Title: SPEED: Secure, PrivatE, and Efficient Deep learning
Arnaud Grivet Sébert, Rafael Pinot, Martin Zuber, Cédric Gouy-Pailler, Renaud Sirdey
Comments: 32 pages, 3 figures. Mach Learn (2021)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[122] arXiv:2006.09511 [pdf, other]
Title: A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication
Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit, Alexandre Garel
Journal-ref: ACM Transactions on the Web, Volume 16, Issue 1, February 2022, Article 4, pp 1 62
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2006.09531 [pdf, other]
Title: Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices
Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L Jean Camp
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:2006.09532 [pdf, other]
Title: BoMaNet: Boolean Masking of an Entire Neural Network
Anuj Dubey, Rosario Cammarota, Aydin Aysu
Subjects: Cryptography and Security (cs.CR)
[125] arXiv:2006.09615 [pdf, other]
Title: De-Anonymizing Text by Fingerprinting Language Generation
Zhen Sun, Roei Schuster, Vitaly Shmatikov
Comments: NeurIPS 2020
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
Total of 353 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-175 176-200 ... 351-353
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack