We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 130 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-130 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 6 May 2024

[1]  arXiv:2405.02238 [pdf, other]
Title: Secure and Efficient General Matrix Multiplication On Cloud Using Homomorphic Encryption
Comments: 10 pages, 7 figures. 4 tables
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2405.02147 [pdf, other]
Title: Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network
Comments: 16 pages, 7 figures, to appear at ACM CCS 2024
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2405.02106 [pdf, ps, other]
Title: Got Root? A Linux Priv-Esc Benchmark
Comments: arXiv admin note: text overlap with arXiv:2310.11409
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2405.02070 [pdf, other]
Title: Strategies for Intrusion Monitoring in Cloud Services
Comments: 5 pages
Journal-ref: Proc of the 8th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2017), Athens, Greece, February 2017, pp. 49-53, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[5]  arXiv:2405.02043 [pdf, ps, other]
Title: On human-centred security: A new systems model based on modes and mode transitions
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[6]  arXiv:2405.01963 [pdf, other]
Title: From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[7]  arXiv:2405.01888 [pdf, other]
Title: Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2405.01867 [pdf, ps, other]
Title: Cyber Security in Energy Informatics: A Non-technical Perspective
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2405.01819 [pdf, other]
Title: Sequencer Level Security
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[10]  arXiv:2405.01809 [pdf, ps, other]
Title: A Logic of Sattestation
Comments: 18 pages. Extended version (including proofs) of paper to appear in CSF'24
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[11]  arXiv:2405.01741 [pdf, other]
Title: PVF (Parameter Vulnerability Factor): A Quantitative Metric Measuring AI Vulnerability and Resilience Against Parameter Corruptions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[12]  arXiv:2405.01728 [pdf, other]
Title: Explainability Guided Adversarial Evasion Attacks on Malware Detectors
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2405.01716 [pdf, other]
Title: ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[14]  arXiv:2405.01693 [pdf, other]
Title: Adversarial Attacks on Reinforcement Learning Agents for Command and Control
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2405.01674 [pdf, ps, other]
Title: Generative AI in Cybersecurity
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2405.01668 [pdf, other]
Title: WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[17]  arXiv:2405.01934 (cross-list from cs.CV) [pdf, other]
Title: Impact of Architectural Modifications on Deep Learning Adversarial Robustness
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2405.01852 (cross-list from cs.DC) [pdf, ps, other]
Title: Tokenization of Real Estate Assets Using Blockchain
Journal-ref: IJIIT vol.18, no.3 2022: pp.1-12.
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[19]  arXiv:2405.01844 (cross-list from cs.NI) [pdf, other]
Title: A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[20]  arXiv:2405.01795 (cross-list from cs.HC) [pdf, ps, other]
Title: The Role of Human Factors in the LastPass Breach
Authors: Niroop Sugunaraj
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)

Fri, 3 May 2024 (showing first 5 of 32 entries)

[21]  arXiv:2405.01509 [pdf, other]
Title: Learnable Linguistic Watermarks for Tracing Model Extraction Attacks on Large Language Models
Comments: not decided
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[22]  arXiv:2405.01460 [pdf, other]
Title: Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders
Comments: Accepted by ICML 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[23]  arXiv:2405.01459 [pdf, other]
Title: Unconditionally Safe Light Client
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2405.01446 [pdf, other]
Title: An Exploratory Case Study on Data Breach Journalism
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[25]  arXiv:2405.01412 [pdf, other]
Title: Applying Transparent Shaping for Zero Trust Architecture Implementation in AWS: A Case Study
Comments: 8 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[ total of 130 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-130 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)