Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for November 2010

Total of 38 entries
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:1011.0363 [pdf, other]
Title: A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks
K. Kumar, J. Nafeesa Begum, V. Sumathy
Comments: 19 pages
Journal-ref: International Journal of peer-to-peer networks (IJP2P) Vol.1, No.1, September 2010
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1011.0527 [pdf, other]
Title: Ciphertext Policy Attribute based Encryption with anonymous access policy
A. Balu, K. Kuppusamy
Journal-ref: International journal of Peer to Peer Networks, pp1-8,Vol 1, Number 1, October 2010
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1011.0755 [pdf, other]
Title: E-Net Models of a Software System for Web Pages Security SECURITY
Nikolai Todorov Stoianov, Veselin Tsenov Tselkov
Comments: 6 pages, 3 figures, Mathematics and Education in Mathematics, 2003 Proceedings of the Thirty Second Spring Conference of the Union of Bulgarian Mathematicians,pp.285-290, ISBN 954-8880-14-8
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1011.0792 [pdf, other]
Title: An Empirical Study of Spam and Spam Vulnerable email Accounts
Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee
Comments: 6 pages, 5 Figures, FGCN 2007, IEEE CS
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[5] arXiv:1011.1050 [pdf, other]
Title: Characterizing Spam traffic and Spammers
Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee
Comments: 6 pages, 4 Figures, ICCIT 2007, IEEE CS
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[6] arXiv:1011.1119 [pdf, other]
Title: Group Anonymity
Oleg Chertov, Dan Tavrov
Comments: 10 pages, 2 tables. Published by Springer in "Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications". The final publication is available at this http URL
Journal-ref: "Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications" (Communications in Computer and Information Science, Volume 81, Part 6, Part 9, 592-601), 2010
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1011.1121 [pdf, other]
Title: Providing Group Anonymity Using Wavelet Transform
Oleg Chertov, Dan Tavrov
Comments: 12 pages, 2 tables. Accepted to be printed by Springer in BNCOD 2010 proceedings (Lecture Notes in Computer Science series)
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1011.1127 [pdf, other]
Title: Group Anonymity: Problems and Solutions
Oleg Chertov, Dan Tavrov
Comments: 13 pages, 6 figures, 1 table. Published by "Lviv Polytechnica Publishing House" in "Information Systems and Networks" (this http URL)
Journal-ref: Information Systems and Networks, No. 673, pp. 3-15, 2010
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1011.1132 [pdf, other]
Title: Providing Data Group Anonymity Using Concentration Differences
Oleg Chertov, Dan Tavrov
Comments: 10 pages, 2 figures, 2 tables. Published in "Mathematical Machines and Systems" (this http URL)
Journal-ref: Mathematical Machines and Systems, No. 3, pp. 34-44, 2010
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1011.1133 [pdf, other]
Title: Data Group Anonymity: General Approach
Oleg Chertov, Dan Tavrov
Comments: 8 pages, 2 figures, 1 table. Published in International Journal of Computer Science and Information Security (this http URL)
Journal-ref: IJCSIS Vol.8 No.7, October 2010, pp. 1-8
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1011.1264 [pdf, other]
Title: Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited
Thomas Holenstein, Robin Künzler, Stefano Tessaro
Comments: Reduced number of rounds from 18 to 14 as this is sufficient for the proof, improved presentation of several lemmas and introduction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Information Theory (cs.IT)
[12] arXiv:1011.1529 [pdf, other]
Title: A Survey on Wireless Sensor Network Security
Jaydip Sen
Comments: 24 pages, 4 figures, 2 tables
Journal-ref: International Journal of Vommunication Networks and Information Security (IJCNIS), Vol 1, No 2, pp. 55 - 78, August 2009
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[13] arXiv:1011.1531 [pdf, other]
Title: An Agent-Based Intrusion Detection System for Local Area Networks
Jaydip Sen
Comments: 13 pages, 5 figures, 2 tables
Journal-ref: International Journal of Communication Networks and Information Security (IJCNIS), Vol 2, No 2, August 2010
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[14] arXiv:1011.1638 [pdf, other]
Title: Processor-Dependent Malware... and codes
Anthony Desnos, Robert Erra, Eric Filiol
Comments: 13 pages - Extended version of the paper presented at the iAWACS 2009 conference
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1011.1793 [pdf, other]
Title: An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
Jaydip Sen, Kaustav Goswami
Comments: 6 pages, 6 figures, 3 tables. Conference: International Symposium on Intelligent Information Systems and Applications (IISA'09)
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1011.2946 [pdf, other]
Title: A Survey of System Security in Contactless Electronic Passports
Anshuman Sinha
Comments: 11 pages, 5 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1011.3098 [pdf, other]
Title: A Clustering-based Location Privacy Protection Scheme for Pervasive Computing
Lin Yao, Chi Lin, Xiangwei Kong, Feng Xia, Guowei Wu
Comments: The 3rd IEEE/ACM Int Conf on Cyber, Physical and Social Computing (CPSCom), IEEE, Hangzhou, China, December 18-20, 2010
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1011.3101 [pdf, other]
Title: A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy
Irfan Syamsuddin, Junseok Hwang
Comments: IEEE 4th International Conference on Application of Information and Communication Technologies AICT2010
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1011.3148 [pdf, other]
Title: E-net models for distribution, access and use of resources in security information systems
Nikolai Stoianov, Veselin Tselkov
Comments: 2 figures, 2 definitions for interacting,
Journal-ref: Mathematics and Education in Mathematics, 2004 Proceedings of the Thirty Fourth Spring Conference of the Union of Bulgarian Mathematicians,pp.251 - 256 ISBN 954-8880-17-2
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1011.3279 [pdf, other]
Title: Bayesian Based Comment Spam Defending Tool
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee
Comments: 14 Pages,4 Figures, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1011.3718 [pdf, other]
Title: Commutative-like Encryption: A New Characterization of ElGamal
Wei Dai
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1011.3879 [pdf, other]
Title: Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding
MinJi Kim, Muriel Medard, Joao Barros
Comments: 10 pages, 10 figures, Submitted to IEEE Journal on Selected Areas in Communications (JSAC) "Advances in Military Networking and Communications"
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
[23] arXiv:1011.5242 [pdf, other]
Title: Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Anne Broadbent, Stacey Jeffery, Alain Tapp
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1011.5295 [pdf, other]
Title: GDB: Group Distance Bounding Protocols
Karim El Defrawy, Srdjan Capkun, Gene Tsudik
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1011.5534 [pdf, other]
Title: GB-hash : Hash Functions Using Groebner Basis
Dhananjoy Dey, Prasanna Raghaw Mishra1, Indranath Sengupta
Comments: The paper has been withdrawn. The authors have found some weaknesses in this design
Subjects: Cryptography and Security (cs.CR); Commutative Algebra (math.AC)
[26] arXiv:1011.5545 [pdf, other]
Title: On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
Shangwei Zhao, Ruyong Feng, Xiao-Shan Gao
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[27] arXiv:1011.5567 [pdf, other]
Title: Secure Multiparty Computation with Partial Fairness
Amos Beimel, Eran Omri, Ilan Orlov
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1011.5696 [pdf, other]
Title: Quantifying and qualifying trust: Spectral decomposition of trust networks
Dusko Pavlovic
Comments: 18 pages, 4 figures; FAST 2010. Version 2: corrected several typos, added a missing arrow in Fig 1, added 2 sentences to the Abstract
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[29] arXiv:1011.0168 (cross-list from quant-ph) [pdf, other]
Title: Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback
Zoltan Gingl, Laszlo B. Kish
Comments: We have to withdraw our earlier claim because errors have been identified in the calculation and computer simulations. However, we do believe that the protocol can be cracked in a similar fashion that needs only a few measurement, no statistics. Thus we hope that this new family of attacks can be developed into some efficient tool. However, the "how" is still an open question thus the Liu-protocol should be considered secure until such solution is found
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[30] arXiv:1011.1261 (cross-list from cs.IT) [pdf, other]
Title: On the Saddle-point Solution and the Large-Coalition Asymptotics of Fingerprinting Games
Yen-Wei Huang, Pierre Moulin
Comments: submitted to IEEE Trans. on Information Forensics and Security
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[31] arXiv:1011.1296 (cross-list from cs.DS) [pdf, other]
Title: Privately Releasing Conjunctions and the Statistical Query Barrier
Anupam Gupta, Moritz Hardt, Aaron Roth, Jonathan Ullman
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[32] arXiv:1011.1375 (cross-list from cs.GT) [pdf, other]
Title: Selling Privacy at Auction
Arpita Ghosh, Aaron Roth
Comments: Extended Abstract appeared in the proceedings of EC 2011
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[33] arXiv:1011.2551 (cross-list from cs.CC) [pdf, other]
Title: On the Problem of Local Randomness in Privacy Amplification with an Active Adversary
Xin Li
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[34] arXiv:1011.2644 (cross-list from cs.IT) [pdf, other]
Title: Do AES encryptions act randomly?
Anna Rimoldi, Massimiliano Sala, Enrico Bertolazzi
Comments: 15 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[35] arXiv:1011.3096 (cross-list from cs.DC) [pdf, other]
Title: A Trust Model Based on Service Classification in Mobile Services
Yang Liu, Zhikui Chen, Feng Xia, Xiaoning Lv, Fanyu Bu
Comments: IEEE/ACM Internet of Things Symposium (IOTS), in conjunction with GreenCom 2010, IEEE, Hangzhou, China, December 18-20, 2010
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[36] arXiv:1011.3985 (cross-list from cs.IT) [pdf, other]
Title: Perfect Secrecy Using Compressed Sensing
Mahmoud Ramezani Mayiami, Babak Seyfe, Hamid G. Bafghi
Comments: 3 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[37] arXiv:1011.5566 (cross-list from cs.IT) [pdf, other]
Title: Secure Index Coding with Side Information
Son Hoang Dau, Vitaly Skachek, Yeow Meng Chee
Comments: 8 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[38] arXiv:1011.6505 (cross-list from cs.SC) [pdf, other]
Title: Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Applications in Cryptanalysis
Xiao-Shan Gao, Zhenyu Huang
Subjects: Symbolic Computation (cs.SC); Cryptography and Security (cs.CR)
Total of 38 entries
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack