Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2020

Total of 347 entries : 1-25 ... 126-150 151-175 176-200 201-225 226-250 251-275 276-300 ... 326-347
Showing up to 25 entries per page: fewer | more | all
[201] arXiv:2010.14037 [pdf, other]
Title: Blockchain-enabled Identity Verification for Safe Ridesharing Leveraging Zero-Knowledge Proof
Wanxin Li, Collin Meese, Hao Guo, Mark Nejad
Comments: This paper has been accepted at IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN), Hefei, China, December 12-14, 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[202] arXiv:2010.14077 [pdf, other]
Title: Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
Giang L. D. Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo
Comments: To appear in IndoCrypt 2020. arXiv admin note: text overlap with arXiv:2005.03178
Subjects: Cryptography and Security (cs.CR)
[203] arXiv:2010.14417 [pdf, other]
Title: 2FE: Two-Factor Encryption for Cloud Storage
Anders Dalskov, Daniele Lain, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
Comments: 18 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[204] arXiv:2010.14445 [pdf, other]
Title: Revolutionizing Medical Data Sharing Using Advanced Privacy Enhancing Technologies: Technical, Legal and Ethical Synthesis
James Scheibner, Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Marcello Ienca, Jacques Fellay, Effy Vayena, Jean-Pierre Hubaux
Comments: 19 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[205] arXiv:2010.14457 [pdf, other]
Title: Multi-factor Physical Layer Security Authentication in Short Blocklength Communication
Miroslav Mitev, Mahdi Shekiba-Herfeh, Arsenia Chorti, Martin Reed
Subjects: Cryptography and Security (cs.CR)
[206] arXiv:2010.14747 [pdf, other]
Title: EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing
Donghyun Yu, Ruei-Hau Hsu, Jemin Lee
Comments: 13 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[207] arXiv:2010.15082 [pdf, other]
Title: How to Not Get Caught When You Launder Money on Blockchain?
Cuneyt G. Akcora, Sudhanva Purusotham, Yulia R. Gel, Mitchell Krawiec-Thayer, Murat Kantarcioglu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[208] arXiv:2010.15232 [pdf, other]
Title: Construction Payment Automation Using Blockchain-Enabled Smart Contracts and Reality Capture Technologies
Hesam Hamledari, Martin Fischer
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Robotics (cs.RO)
[209] arXiv:2010.15329 [pdf, other]
Title: Scalable Attack-Resistant Obfuscation of Logic Circuits
Abdulrahman Alaql, Swarup Bhunia
Subjects: Cryptography and Security (cs.CR)
[210] arXiv:2010.15394 [pdf, other]
Title: Smart Homes: Security Challenges and Privacy Concerns
Fraser Hall, Leandros Maglaras, Theodoros Aivaliotis, Loukas Xagoraris, Ioanna Kantzavelou
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[211] arXiv:2010.15678 [pdf, other]
Title: On the Failure of the Smart Approach of the GPT Cryptosystem
Herve Tale Kalachi
Comments: Accepted to Cryptologia. arXiv admin note: text overlap with arXiv:1602.08549
Subjects: Cryptography and Security (cs.CR)
[212] arXiv:2010.15697 [pdf, other]
Title: Generalized Insider Attack Detection Implementation using NetFlow Data
Yash Samtani, Jesse Elwell
Comments: 7 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[213] arXiv:2010.15711 [pdf, other]
Title: 5W1H-based Expression for the Effective Sharing of Information in Digital Forensic Investigations
Jaehyeok Han, Jieon Kim, Sangjin Lee
Comments: This paper was presented at the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, Delhi, India, in January 2020
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[214] arXiv:2010.15718 [pdf, other]
Title: Minimal Model Structure Analysis for Input Reconstruction in Federated Learning
Jia Qian, Hiba Nassar, Lars Kai Hansen
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Image and Video Processing (eess.IV)
[215] arXiv:2010.15862 [pdf, other]
Title: Detecting FDI Attack on Dense IoT Network with Distributed Filtering Collaboration and Consensus
Carlos Pedroso, Aldri Santos, Michele Nogueira
Comments: This work has been accept to the IEEE LATINCOM2020. Copyright 978-1-7281-8903-1/20/$31.00 \c{opyright}2020 IEEE
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[216] arXiv:2010.15866 [pdf, other]
Title: CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf
Comments: Accepted to be published in the proceedings of the 30th USENIX Security Symposium (USENIX Security '21 )
Subjects: Cryptography and Security (cs.CR)
[217] arXiv:2010.15867 [pdf, other]
Title: SANS: Self-sovereign Authentication for Network Slices
Xavier Salleras, Vanesa Daza
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[218] arXiv:2010.15985 [pdf, other]
Title: Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme
Kunjal Panchal
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[219] arXiv:2010.16024 [pdf, other]
Title: Evaluation of vulnerability reproducibility in container-based Cyber Range
Ryotaro Nakata, Akira Otsuka
Comments: 14 pages, 7 figures, 9 tables
Subjects: Cryptography and Security (cs.CR)
[220] arXiv:2010.16034 [pdf, other]
Title: State sharding model on the blockchain
Xiangyu Wang, Ting Yang, Yu Wang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[221] arXiv:2010.16045 [pdf, other]
Title: Machine Learning (In) Security: A Stream of Problems
Fabrício Ceschin, Marcus Botacin, Albert Bifet, Bernhard Pfahringer, Luiz S. Oliveira, Heitor Murilo Gomes, André Grégio
Journal-ref: Digital Threats 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[222] arXiv:2010.16108 [pdf, other]
Title: Classifying Malware Images with Convolutional Neural Network Models
Ahmed Bensaoud, Nawaf Abudawaood, Jugal Kalita
Comments: 12 pages, 11 Figures
Journal-ref: Vol.22, No.6, PP.1022-1031, Nov. 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[223] arXiv:2010.16204 [pdf, other]
Title: Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini
Comments: 17 pages, 4 figures. Accepted for publication on IEEE Intelligent Systems magazine
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[224] arXiv:2010.16274 [pdf, other]
Title: Towards Understanding and Demystifying Bitcoin Mixing Services
Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiaopu Luo, Zhi Wang, Fan Zhang, Kui Ren
Subjects: Cryptography and Security (cs.CR)
[225] arXiv:2010.16323 [pdf, other]
Title: Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 347 entries : 1-25 ... 126-150 151-175 176-200 201-225 226-250 251-275 276-300 ... 326-347
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack