Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2014

Total of 68 entries : 1-25 26-50 51-68
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1403.0184 [pdf, other]
Title: Some mathematical remarks on the polynomial selection in NFS
Razvan Barbulescu (LORIA), Armand Lachand (IECL)
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[2] arXiv:1403.0282 [pdf, other]
Title: An Explicit Trust Model Towards Better System Security
Orhio Mark Creado, Bala Srinivasan, Phu Dung Le, Jefferson Tan
Comments: 13 pages, 7 figures, The Fourth International Conference on Computer Science and Information Technology, CCSIT 2014
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1403.0297 [pdf, other]
Title: I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis
Brad Miller, Ling Huang, A. D. Joseph, J. D. Tygar
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1403.0439 [pdf, other]
Title: Verbesserung von OS- und Service-Fingerprinting mittels Fuzzing
Michael Hanspach
Comments: 75 pages, Diplom thesis / Diplomarbeit. September 2008, German language content
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[5] arXiv:1403.0766 [pdf, other]
Title: Service-Fingerprinting mittels Fuzzing
Michael Hanspach, Ralf Schumann, Stefan Schemmer, Sebastian Vandersee
Comments: 10 pages, May 2009, German language content. This paper is based on the Diplom thesis / Diplomarbeit: "Verbesserung von OS- und Service-Fingerprinting mittels Fuzzing", Michael Hanspach, September 2008. DACH Security 2009: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, May 2009, ISBN 300027488X
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[6] arXiv:1403.1142 [pdf, other]
Title: Automated analysis of security protocols with global state
Steve Kremer (INRIA Nancy - Grand Est / LORIA / LIFC), Robert Künnemann
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1403.1165 [pdf, other]
Title: A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems
Michael Hanspach, Jörg Keller
Comments: 9 pages
Journal-ref: In Proceedings of the 7th Layered Assurance Workshop, New Orleans, LA, USA, December 2013
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS); Sound (cs.SD)
[8] arXiv:1403.1322 [pdf, other]
Title: Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U. Herath, J. Alawatugoda, R.G. Ragel
Journal-ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 75-80, 17-20 Dec. 2013
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1403.1343 [pdf, other]
Title: Ubic: Bridging the gap between digital cryptography and the physical world
Mark Simkin, Dominique Schroeder, Andreas Bulling, Mario Fritz
Comments: In ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pp. 56-75, Wroclaw, Poland, September 7-11, 2014. Springer, Berlin, Germany
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[10] arXiv:1403.1468 [pdf, other]
Title: Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Maura B. Paterson, Douglas R. Stinson
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[11] arXiv:1403.1631 [pdf, other]
Title: Unsupervised Anomaly-based Malware Detection using Hardware Features
Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo
Comments: 1 page, Latex; added description for feature selection in Section 4, results unchanged
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1403.1639 [pdf, other]
Title: Optimal Patching in Clustered Malware Epidemics
Soheil Eshghi, MHR. Khouzani, Saswati Sarkar, Santosh S. Venkatesh
Comments: 18 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI); Systems and Control (eess.SY); Optimization and Control (math.OC)
[13] arXiv:1403.1866 [pdf, other]
Title: An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System
Daniel Fett, Ralf Kuesters, Guido Schmitz
Comments: An abridged version appears in S&P 2014
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1403.1906 [pdf, other]
Title: Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
Scott Coull, Kevin Dyer
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1403.1910 [pdf, other]
Title: Text Entry Method Affects Password Security
Yulong Yang, Janne Lindqvist, Antti Oulasvirta
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[16] arXiv:1403.2123 [pdf, other]
Title: Privacy-Friendly Collaboration for Cyber Threat Mitigation
Julien Freudiger, Emiliano De Cristofaro, Alex Brito
Comments: This paper has been withdrawn as it has been superseded by arXiv:1502.05337
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[17] arXiv:1403.2237 [pdf, other]
Title: Stateful Security Protocol Verification
Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1403.2514 [pdf, other]
Title: Answering queries using pairings
Alberto Trombetta, Giuseppe Persiano, Stefano Braghin
Comments: 18 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1403.2844 [pdf, other]
Title: Analysis And Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol For Grid Computing
Amr Farouk, Mohamed M. Fouad, Ahmed A. Abdelhafez
Comments: 14 pages
Journal-ref: International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 1, February 2014
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1403.3235 [pdf, other]
Title: A Security Analysis of Browser Extensions
Abhay Rana, Rushil Nagda
Comments: More information on the following links: this http URL this http URL this https URL
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1403.3366 [pdf, other]
Title: Fingerprinting Smart Devices Through Embedded Acoustic Components
Anupam Das, Nikita Borisov, Matthew Caesar
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1403.3563 [pdf, other]
Title: Proving Security Goals With Shape Analysis Sentences
John D. Ramsdell
Comments: MITRE Technical Report. arXiv admin note: substantial text overlap with arXiv:1204.0480
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1403.3660 [pdf, other]
Title: A CCA secure cryptosystem using matrices over group rings
Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[24] arXiv:1403.3661 [pdf, other]
Title: Publicly Verifiable Secret Sharing Using Non-Abelian Groups
Delaram Kahrobaei, Elizabeth Vidaurre
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[25] arXiv:1403.4165 [pdf, other]
Title: Heisenberg Groups as Platform for the AAG key-exchange protocol
Delaram Kahrobaei, Ha T.Lam
Comments: arXiv admin note: text overlap with arXiv:1305.0548
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
Total of 68 entries : 1-25 26-50 51-68
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack