Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2010

Total of 31 entries
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:1009.0026 [pdf, other]
Title: A secret sharing scheme using groups
Dimitrios Panagopoulos
Comments: 4 pages
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[2] arXiv:1009.0278 [pdf, other]
Title: Expected loss analysis of thresholded authentication protocols in noisy conditions
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay
Comments: 17 pages, 2 figures; draft
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[3] arXiv:1009.0655 [pdf, other]
Title: The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem)
Nikolai Stoianov, Veselina Aleksandrova
Comments: Acknowledgment: The work presented in this paper has been performed in the framework of the EU Project INDECT (Intelligent information system supporting observation, searching and detection for security of citizens in urban environment) - grant agreement number: 218086
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1009.1038 [pdf, other]
Title: JIT Spraying and Mitigations
Piotr Bania
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1009.1544 [pdf, other]
Title: Pan-private Algorithms: When Memory Does Not Help
Darakhshan Mir, S. Muthukrishnan, Aleksandar Nikolov, Rebecca N. Wright
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[6] arXiv:1009.2275 [pdf, other]
Title: PhishDef: URL Names Say It All
Anh Le, Athina Markopoulou, Michalis Faloutsos
Comments: 9 pages, submitted to IEEE INFOCOM 2011
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[7] arXiv:1009.2406 [pdf, other]
Title: Adaptation of the neural network-based IDS to new attacks detection
Przemyslaw Kukielka, Zbigniew Kotulski
Comments: 9 pages, 3 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1009.2411 [pdf, other]
Title: A Protection Approach for Video Information transmitted in TCP/IP based networks
Nikolai Stoianov
Comments: 5 pages, 7 figures, 3rd INDECT/IEEE International Conference on MCSS on May 6th and 7th, Krakow, Poland
Journal-ref: PROCEEDINGS IEEE International Conference MCSS 2010 Multimedia Communications, Services and Security Krakow, 6-7 May 2010, ISBN 978-83-88309-92-2 ,
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1009.2476 [pdf, other]
Title: One software tool for testing square s-boxes
Nikolai Stoianov
Comments: Acknowledgment-The work presented in this paper has been performed in the framework of the EU Project INDECT--grant agreement number: 218086. 12th International Conference on Research in Telecommunication Technologies RTT 2010 (September 8 - 10), Ostrava, Czech Republic
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1009.2491 [pdf, other]
Title: INDECT Advanced Security Requirements
Manuel Uruena, Petr Machnik, Maria Martinez, Marcin Niemiec, Nikolai Stoianov
Comments: PROCEEDINGS (Poster session) IEEE International Conference MCSS 2010 Multimedia Communications, Services and Security Krakow, 6-7 May 2010, ISBN 978-83-88309-92-2 Acknowledgment-The work presented in this paper has been performed in the framework of the EU Project INDECT--grant agreement number: 218086
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1009.2826 [pdf, other]
Title: Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography
Dipti Kapoor Sarmah, Neha Bajpai
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1009.2832 [pdf, other]
Title: Sharing Graphs
K. R. Sahasranand, Nithin Nagaraj
Comments: 17 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1009.3539 [pdf, other]
Title: Is A Quantum Stabilizer Code Degenerate or Nondegenerate for Pauli Channel?
Fangying Xiao, Hanwu Chen
Comments: 7 pages,1 figure
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[14] arXiv:1009.3626 [pdf, other]
Title: A Survey on Low-cost RFID Authentication Protocols
Irfan Syamsuddin, Song Han, Vidyasagar Potdar, Tharam Dillon
Comments: Submitted to the International Journal of Computer Systems Science and Engineering
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1009.3951 [pdf, other]
Title: Quantifying Information Leakage in Finite Order Deterministic Programs
Ji Zhu, Mudhakar Srivatsa
Comments: 14 pages, 1 figure. A shorter version of this paper is submitted to ICC 2011
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[16] arXiv:1009.4000 [pdf, other]
Title: Malicious cryptography techniques for unreversable (malicious or not) binaries
Eric Filiol
Comments: 17 pages, 2 figures, accepted for presentation at H2HC'10
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1009.4012 [pdf, other]
Title: Van Wijngaarden grammars, metamorphism and K-ary malwares
Geoffroy Gueguen
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1009.4625 [pdf, other]
Title: Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version)
Alberto Calvi, Silvio Ranise, Luca Viganò
Comments: 12 pages, 3 figures, short version to appear in the Proceedings of WOSS'10, 1st Workshop on Software Services: Frameworks and Platforms
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Software Engineering (cs.SE)
[19] arXiv:1009.5729 [pdf, other]
Title: A secure email login system using virtual password
Bhavin Tanti, Nishant Doshi
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1009.5802 [pdf, other]
Title: Synthesis of Binary k-Stage Machines
Elena Dubrova
Comments: 3 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1009.1132 (cross-list from cs.MA) [pdf, other]
Title: Efficient Collaborative Application Monitoring Scheme for Mobile Networks
Yaniv Altshuler, Shlomi Dolev, Yuval Elovici
Comments: 19 pages (single colmun) + 9 pages (appendix and references)
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[22] arXiv:1009.1596 (cross-list from quant-ph) [pdf, other]
Title: Achieving the physical limits of the bounded-storage model
Prabha Mandayam, Stephanie Wehner
Comments: 10 pages (revtex), 2 figures, v2: published version, minor changes
Journal-ref: Phys. Rev. A 83, 022329 (2011)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[23] arXiv:1009.1759 (cross-list from cs.IT) [pdf, other]
Title: On Compression of Data Encrypted with Block Ciphers
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[24] arXiv:1009.1833 (cross-list from quant-ph) [pdf, other]
Title: Device-Independent Quantum Key Distribution with Commuting Measurements
Esther Hänggi, Renato Renner
Comments: 26 pages. See also the related work arXiv:1009.1567
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[25] arXiv:1009.2490 (cross-list from quant-ph) [pdf, other]
Title: Position-Based Quantum Cryptography: Impossibility and Constructions
Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
Comments: 27 pages, 5 figures. v4: improved proofs for the impossibility theorem and for the instantaneous computation theorem
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[26] arXiv:1009.2556 (cross-list from cs.IT) [pdf, other]
Title: Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks
Sameer Pawar, Salim El Rouayheb, Kannan Ramchandran
Comments: 37 pages, 11 figures, submitted to IT transactions
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[27] arXiv:1009.3041 (cross-list from cs.IT) [pdf, other]
Title: Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel
Chan Wong Wong, Tan F. Wong, John M.Shea
Comments: submitted to IEEE Trans. on Information Forensics and Security, special issues on using the physical layer for securing the next generation of communication systems
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[28] arXiv:1009.3711 (cross-list from cs.SE) [pdf, other]
Title: Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Yi-Hsun Wang, Ching-Hao Mao, Hahn-Ming Lee
Comments: In Proceedings TAV-WEB 2010, arXiv:1009.3306
Journal-ref: EPTCS 35, 2010, pp. 15-26
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[29] arXiv:1009.4188 (cross-list from cs.CC) [pdf, other]
Title: Robust Coin Flipping
Gene S. Kopp, John D. Wiltshire-Gordon
Comments: 22 pages, 1 figure
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR)
[30] arXiv:1009.4741 (cross-list from quant-ph) [pdf, other]
Title: Tight bounds for classical and quantum coin flipping
Esther Hänggi, Jürg Wullschleger
Comments: 18 pages, 2 figures; v2: published version
Journal-ref: Proceedings of TCC 2011, p 468-485
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[31] arXiv:1009.5423 (cross-list from cs.PL) [pdf, other]
Title: The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY
Serguei A. Mokhov, Joey Paquet, Mourad Debbabi
Comments: 11 pages, 7 figures, index; extended abstract presented at VizSec'10 at this http URL ; short paper accepted at PST'11
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Graphics (cs.GR)
Total of 31 entries
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack