Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2022

Total of 337 entries : 1-25 26-50 51-75 76-100 101-125 126-150 ... 326-337
Showing up to 25 entries per page: fewer | more | all
[51] arXiv:2207.02711 [pdf, other]
Title: SocChain: Blockchain with Swift Proportional Governance for Bribery Mitigation
Deepal Tennakoon, Vincent Gramoli
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[52] arXiv:2207.03247 [pdf, other]
Title: Local Inversion of maps: Black box Cryptanalysis
Virendra Sule
Comments: 13 pages. Summery and comprehension of a previous paper arxiv.org/abs/2202.06584v2
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:2207.03269 [pdf, other]
Title: A Methodology to Support Automatic Cyber Risk Assessment Review
Marco Angelini, Silvia Bonomi, Alessandro Palma
Comments: 16 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:2207.03339 [pdf, other]
Title: Comparing the Utility and Disclosure Risk of Synthetic Data with Samples of Microdata
Claire Little, Mark Elliot, Richard Allmendinger
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[55] arXiv:2207.03346 [pdf, other]
Title: Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol
Tyson Brooks
Journal-ref: International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:2207.03384 [pdf, html, other]
Title: Efficient Pruning for Machine Learning Under Homomorphic Encryption
Ehud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculin
Journal-ref: In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds) Computer Security - ESORICS 2023. ESORICS 2023. Lecture Notes in Computer Science, vol 14347. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[57] arXiv:2207.03534 [pdf, other]
Title: A Review of Quantum Cybersecurity: Threats, Risks and Opportunities
Md Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib
Journal-ref: 1st International Conference on AI in Cybersecurity (ICAIC), 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[58] arXiv:2207.03574 [pdf, other]
Title: Demystifying the Adversarial Robustness of Random Transformation Defenses
Chawin Sitawarin, Zachary Golan-Strieb, David Wagner
Comments: ICML 2022 (short presentation), AAAI 2022 AdvML Workshop (best paper, oral presentation)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[59] arXiv:2207.03576 [pdf, other]
Title: Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems
D'Jeff Kanda Nkashama, Arian Soltani, Jean-Charles Verdier, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza
Comments: Machine Learning for Cybersecurity Workshop at the International Conference on Machine Learning(ICLR-ML4CY)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[60] arXiv:2207.03940 [pdf, other]
Title: Bistochastic privacy
Nicolas Ruiz, Josep Domingo-Ferrer
Comments: To be published in Lecture Notes in Artificial Intelligence vol 13408, Modeling Decisions for Artificial Intelligence 19th International Conference MDAI 2022, Sant Cugat, Catalonia, August 30 - 2 September 2022
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:2207.03987 [pdf, html, other]
Title: Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$
Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, Delaram Kahrobaei
Comments: 18 pages, an appendix with a python/sage implementation of the hash functions
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[62] arXiv:2207.04145 [pdf, other]
Title: Strong Anonymity for Mesh Messaging
Neil Perry, Bruce Spang, Saba Eskandarian, Dan Boneh
Comments: 21 pages, 11 figures; added reference to introduction
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:2207.04424 [pdf, other]
Title: An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities
Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2207.04434 [pdf, other]
Title: Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication
Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[65] arXiv:2207.04459 [pdf, other]
Title: A Decentralised Real Estate Transfer Verification Based on Self-Sovereign Identity and Smart Contracts
Abubakar-Sadiq Shehu, Antonio Pinto, Manuel E. Correia
Comments: Shehu, A-S.; Pinto, A. and Correia, M. (2022). A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts. This article has been accepted for publication In Proceedings of the 19th International Conference on Security and Cryptography
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2207.04503 [pdf, other]
Title: BotNet Intrusion Detection System in Internet of Things with Developed Deep Learning
Amirabas Kabiri Zamani, Amirahmad Chapnevis
Comments: 19 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:2207.04548 [pdf, other]
Title: Differential Imaging Forensics: A Feasibility Study
Aurélien Bourquard, Jeff Yan
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:2207.04604 [pdf, other]
Title: Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption
Guowen Xu, Guanlin Li, Shangwei Guo, Tianwei Zhang, Hongwei Li
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:2207.04620 [pdf, other]
Title: Hercules: Boosting the Performance of Privacy-preserving Federated Learning
Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:2207.04637 [pdf, other]
Title: SIMC 2.0: Improved Secure ML Inference Against Malicious Clients
Guowen Xu, Xingshuo Han, Tianwei Zhang, Shengmin Xu, Jianting Ning, Xinyi Huang, Hongwei Li, Robert H.Deng
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:2207.04668 [pdf, other]
Title: A Secure Fingerprinting Framework for Distributed Image Classification
Guowen Xu, Xingshuo Han, Anguo Zhang, Tianwei Zhang
Comments: need new formal analysis
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:2207.04692 [pdf, other]
Title: PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning
Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin
Comments: 13 pages main text, 7 pages supplementary material (total 20 pages), 8 figures, submitted to IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73] arXiv:2207.04706 [pdf, other]
Title: What Your Wearable Devices Revealed About You and Possibilities of Non-Cooperative 802.11 Presence Detection During Your Last IPIN Visit
Tomas Bravenec, Joaquín Torres-Sospedra, Michael Gould, Tomas Fryza
Comments: 7 pages, 7 figures, submitted to IPIN2022 conference
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:2207.04716 [pdf, other]
Title: PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, Martin Serror
Comments: Cyber Security Experimentation and Test Workshop (CSET 2022)
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:2207.04785 [pdf, other]
Title: SALSA: Attacking Lattice Cryptography with Transformers
Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter
Comments: Extended version of work published at NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 337 entries : 1-25 26-50 51-75 76-100 101-125 126-150 ... 326-337
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack