Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2022

Total of 337 entries : 1-50 51-100 76-125 101-150 151-200 201-250 ... 301-337
Showing up to 50 entries per page: fewer | more | all
[76] arXiv:2207.04843 [pdf, other]
Title: Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems
Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[77] arXiv:2207.05047 [pdf, other]
Title: MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably
Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:2207.05240 [pdf, other]
Title: From Bitcoin to Solana -- Innovating Blockchain towards Enterprise Applications
Xiangyu Li, Xinyu Wang, Tingli Kong, Junhao Zheng, Min Luo
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:2207.05269 [pdf, other]
Title: Security Methods in Internet of vehicles
Mahmood A. Al-Shareeda, Selvakumar Manickam
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:2207.05297 [pdf, other]
Title: Efficient and Privacy Preserving Group Signature for Federated Learning
Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[81] arXiv:2207.05383 [pdf, other]
Title: Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:2207.05413 [pdf, other]
Title: A Security-aware and LUT-based CAD Flow for the Physical Synthesis of eASICs
Zain UlAbideen, Tiago Diadami Perez, Mayler Martins, Samuel Pagliarini
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Logic in Computer Science (cs.LO)
[83] arXiv:2207.05436 [pdf, other]
Title: Markov Decision Process For Automatic Cyber Defense
Xiaofan Zhou, Simon Yusuf Enoch, Dong Seong Kim
Comments: 12 pages conference paper (Accepted)
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:2207.05475 [pdf, other]
Title: A novel conservative chaos driven dynamic DNA coding for image encryption
Vinod Patidar, Gurpreet Kaur
Comments: 29 pages, 5 figures, 15 tables
Journal-ref: Frontiers in Applied Mathematics and Statistics 8:1100839 (2023)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[85] arXiv:2207.05548 [pdf, other]
Title: Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
Luca Demetrio, Battista Biggio, Fabio Roli
Journal-ref: IEEE Security & Privacy, 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86] arXiv:2207.05623 [pdf, other]
Title: Attacking (and defending) the Maritime Radar System
G. Longo, E. Russo, A. Armando, A. Merlo
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2207.05675 [pdf, other]
Title: Time synchronization protocol for the KLJN secure key exchange scheme
Laszlo B. Kish
Comments: In press at Fluctuation and Noise Letters. Coming out in the October 2022 issue
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[88] arXiv:2207.05676 [pdf, other]
Title: HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version)
Mohammad Sina Karvandi, MohammadHossein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadizanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Operating Systems (cs.OS)
[89] arXiv:2207.05869 [pdf, other]
Title: Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage
Parikshit Hegde, Robert Streit, Yanni Georghiades, Chaya Ganesh, Sriram Vishwanath
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:2207.05890 [pdf, other]
Title: E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System
Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[91] arXiv:2207.05978 [pdf, other]
Title: Enhanced Security and Privacy via Fragmented Federated Learning
Najeeb Moharram Jebreel, Josep Domingo-Ferrer, Alberto Blanco-Justicia, David Sanchez
Comments: IEEE Transactions on Neural Networks and Learning Systems (To Appear)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[92] arXiv:2207.06102 [pdf, other]
Title: A blockchain-based secure storage scheme for medical information
Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang, Zhongdai Wu
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:2207.06109 [pdf, other]
Title: A Personalised User Authentication System based on EEG Signals
Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[94] arXiv:2207.06144 [pdf, other]
Title: A Beyond-5G Authentication and Key Agreement Protocol
Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian, Valtteri Niemi
Journal-ref: Network and System Security. NSS 2022. Lecture Notes in Computer Science, vol 13787. Springer, Cham, 2022, pp. 249-264
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:2207.06182 [pdf, other]
Title: Connected Vehicles: A Privacy Analysis
Mark Quinlan, Jun Zhao, Andrew Simpson
Journal-ref: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, Cham, 2019
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[96] arXiv:2207.06236 [pdf, other]
Title: Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities
Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[97] arXiv:2207.06358 [pdf, html, other]
Title: Smooth Anonymity for Sparse Graphs
Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina
Comments: WWW 2024 Short Paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[98] arXiv:2207.06589 [pdf, other]
Title: On the Feasibility of Unclonable Encryption, and More
Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[99] arXiv:2207.06683 [pdf, other]
Title: Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
Misbah Shafi, Rakesh Kumar Jha
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:2207.06686 [pdf, other]
Title: Behavioral Model For Live Detection of Apps Based Attack
Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain
Subjects: Cryptography and Security (cs.CR)
[101] arXiv:2207.06944 [pdf, html, other]
Title: Differentially Private Graph Learning via Sensitivity-Bounded Personalized PageRank
Alessandro Epasto, Vahab Mirrokni, Bryan Perozzi, Anton Tsitsulin, Peilin Zhong
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
[102] arXiv:2207.07002 [pdf, other]
Title: Applications of Blockchain for the Governance of Integrated Project Delivery: A Crypto Commons Approach
Jens J. Hunhevicz, Pierre-Antoine Brasey, Marcella M. M. Bonanomi, Daniel M. Hall, Martin Fischer
Journal-ref: Project Leadership and Society, Volume 5, 2024, 100132
Subjects: Cryptography and Security (cs.CR)
[103] arXiv:2207.07177 [pdf, other]
Title: Characterizing and Optimizing End-to-End Systems for Private Inference
Karthik Garimella, Zahra Ghodsi, Nandan Kumar Jha, Siddharth Garg, Brandon Reagen
Comments: Accepted to the 28th edition of the Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2023 Conference
Subjects: Cryptography and Security (cs.CR)
[104] arXiv:2207.07292 [pdf, other]
Title: PASS: A Parameter Audit-based Secure and Fair Federated Learning Scheme against Free-Rider Attack
Jianhua Wang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Yixiang Wang
Comments: 11 pages, 13 figures, 5 tables. Accepted by IoTJ. For associated file, see early access this https URL
Journal-ref: IEEE Internet of Things Journal, vol. 11, no. 1, pp. 1374-1384, 1 Jan.1, 2024
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:2207.07385 [pdf, other]
Title: Identifying and Quantifying Trade-offs in Multi-Stakeholder Risk Evaluation with Applications to the Data Protection Impact Assessment of the GDPR
Majid Mollaeefar, Silvio Ranise
Subjects: Cryptography and Security (cs.CR)
[106] arXiv:2207.07407 [pdf, other]
Title: ERIC: An Efficient and Practical Software Obfuscation Framework
Alperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oğuz Ergin, Marco Ottavi
Comments: DSN 2022 - The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[107] arXiv:2207.07413 [pdf, other]
Title: SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
Mordechai Guri
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:2207.07446 [pdf, other]
Title: Electric Democracy: Proof of Work to secure Elections
Vitaly Zuevsky
Comments: Novel application of cryptographic primitives for electronic voting. Discussion is invited
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:2207.07465 [pdf, other]
Title: Creating an Explainable Intrusion Detection System Using Self Organizing Maps
Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[110] arXiv:2207.07721 [pdf, other]
Title: FLIP: A Utility Preserving Privacy Mechanism for Time Series
Tucker McElroy, Anindya Roy, Gaurab Hore
Comments: 19 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[111] arXiv:2207.07738 [pdf, other]
Title: A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions
Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[112] arXiv:2207.07779 [pdf, other]
Title: DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:2207.07816 [pdf, other]
Title: Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees
Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[114] arXiv:2207.07863 [pdf, other]
Title: Deep Set Classifier for Financial Forensics: An application to detect money laundering
Jonathan Pan
Comments: To be improved. Will be uploading a revised paper with major changes
Subjects: Cryptography and Security (cs.CR)
[115] arXiv:2207.07964 [pdf, other]
Title: A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem
Mohammad Anagreh, Peeter Laud
Comments: 30 pages, 7 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[116] arXiv:2207.07996 [pdf, other]
Title: Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake
Matheus V.X. Ferreira, Ye Lin Sally Hahn, S. Matthew Weinberg, Catherine Yu
Comments: 31 pages, ACM EC 2022
Journal-ref: EC '22: Proceedings of the 23rd ACM Conference on Economics and Computation, 2022, 89-114
Subjects: Cryptography and Security (cs.CR); Theoretical Economics (econ.TH); Optimization and Control (math.OC)
[117] arXiv:2207.08105 [pdf, other]
Title: Mobile Security for the modern CEO: Attacks, Mitigations, and Future Trends
Marc Schmitt
Comments: 25 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[118] arXiv:2207.08109 [pdf, other]
Title: Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks
Tatsuya Chuman, Hitoshi Kiya
Comments: To be appeared in International Conference on Machine Learning and Cybernetics 2022
Subjects: Cryptography and Security (cs.CR)
[119] arXiv:2207.08280 [pdf, other]
Title: Building Correlation Immune Functions from Sets of Mutually Orthogonal Cellular Automata
Luca Mariot, Luca Manzoni
Comments: 15 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[120] arXiv:2207.08367 [pdf, other]
Title: Protecting Global Properties of Datasets with Distribution Privacy Mechanisms
Michelle Chen, Olga Ohrimenko
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[121] arXiv:2207.08392 [pdf, other]
Title: Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities
Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu
Comments: In IEEE Symposium on Security and Privacy 2023
Subjects: Cryptography and Security (cs.CR)
[122] arXiv:2207.08478 [pdf, other]
Title: Towards Automated Classification of Attackers' TTPs by combining NLP with ML Techniques
Clemens Sauerwein, Alexander Pfohl
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[123] arXiv:2207.08484 [pdf, other]
Title: Fine-grained Data Access Control for Collaborative Process Execution on Blockchain
Edoardo Marangone, Claudio Di Ciccio, Ingo Weber
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[124] arXiv:2207.08556 [pdf, other]
Title: A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling
Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang
Subjects: Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[125] arXiv:2207.08891 [pdf, other]
Title: Wink: Deniable Secure Messaging
Anrin Chakraborti, Darius Suciu, Radu Sion
Subjects: Cryptography and Security (cs.CR)
Total of 337 entries : 1-50 51-100 76-125 101-150 151-200 201-250 ... 301-337
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack