close this message
arXiv smileybones

The Scheduled Database Maintenance 2025-09-17 11am-1pm UTC has been completed

  • The scheduled database maintenance has been completed.
  • We recommend that all users logout and login again..

Blog post
Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2014

Total of 68 entries : 1-25 26-50 51-68
Showing up to 25 entries per page: fewer | more | all
[26] arXiv:1403.4780 [pdf, other]
Title: An Inter-Component Pixels Permutation Based Color Image Encryption Using Hyper-chaos
Musheer Ahmad, Hamed D Al-Sharari
Journal-ref: European Journal of Scientific Research, Vol. 116, No. 1, pp. 115-121, 2013
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1403.4782 [pdf, other]
Title: Chaos Based Mixed Keystream Generation for Voice Data Encryption
Musheer Ahmad, Bashir Alam, Omar Farooq
Journal-ref: International Journal on Cryptography and Information Security, Vol. 2, No. 1, pp. 36--45, 2012
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1403.4829 [pdf, other]
Title: Blind Recognition of Touched Keys: Attack and Countermeasures
Qinggang Yue, Zhen Ling, Benyuan Liu, Xinwen Fu, Wei Zhao
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1403.5001 [pdf, other]
Title: k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
Bharath K. Samanthula, Yousef Elmehdwi, Wei Jiang
Comments: 29 pages, 2 figures, 3 tables arXiv admin note: substantial text overlap with arXiv:1307.4824
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:1403.5598 [pdf, other]
Title: Adversarial Wiretap Channel with Public Discussion
Pengwei Wang, Reihaneh Safavi-Naini
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1403.5698 [pdf, other]
Title: Secret-Sharing for NP
Ilan Komargodski, Moni Naor, Eylon Yogev
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1403.5715 [pdf, other]
Title: Mining Attribute-Based Access Control Policies from Logs
Zhongyuan Xu, Scott D. Stoller
Comments: arXiv admin note: substantial text overlap with arXiv:1306.2401
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[33] arXiv:1403.5871 [pdf, other]
Title: The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
Yue Liu, David R. Bild, Robert P. Dick, Z. Morley Mao, Dan S. Wallach
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1403.6213 [pdf, other]
Title: Embedding Cryptographic Features in Compressive Sensing
Yushu Zhang, Kwok-Wo Wong, Di Xiao, Leo Yu Zhang, Ming Li
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[35] arXiv:1403.6626 [pdf, other]
Title: Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion
Musheer Ahmad, Hamed D. Alsharari, Munazza Nizam
Journal-ref: European Journal of Scientific Research, ISSN 1450-216X Vol. 98, No. 3, 2013
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1403.6676 [pdf, other]
Title: Bitcoin Transaction Malleability and MtGox
Christian Decker, Roger Wattenhofer
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[37] arXiv:1403.6955 [pdf, other]
Title: Vulnerability Scanners-A Proactive Approach To Assess Web Application Security
Sheetal Bairwa, Bhawna Mewara, Jyoti Gajrani
Comments: 12 pages, 6 figures, 3 tables, SCNDS 2013 Conference. International Journal on Computational Sciences & Applications (IJCSA)2014
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1403.7088 [pdf, other]
Title: Tailored Security: Building Nonrepudiable Security Service-Level Agreements
Takeshi Takahashi, Jarmo Harju, Joona Kannisto, Bilhanan Silverajan, Jarmo Harju, Shin'ichiro Matsuo
Comments: This is a preprint version of our article posted to IEEE Vehicular Technology Magazine
Journal-ref: IEEE Vehicular Technology Magazine, Volume 8, Issue 3, September 2013
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[39] arXiv:1403.7243 [pdf, other]
Title: Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system
Zoltan Gingl, Robert Mingesz
Journal-ref: PLoS ONE (2014) 9(4): e96109
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1403.7293 [pdf, other]
Title: Constant time encryption as a countermeasure against remote cache timing attacks
D. Jayasinghe, R. G. Ragel, D. Elkaduwe
Journal-ref: Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on, 27-29 Sept 2012, pp 129-134, Beijing
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1403.7297 [pdf, other]
Title: Countermeasures against Bernstein's remote cache timing attack
Janaka Alawatugoda, Darshana Jayasinghe, Roshan Ragel
Journal-ref: Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on, 16-19 Aug. 2011, pp. 43-48, Kandy
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:1403.7726 [pdf, other]
Title: Relevant Feature Selection Model Using Data Mining for Intrusion Detection System
Ayman I. Madbouly, Amr M. Gody, Tamer M. Barakat
Comments: 12 Pages, 3 figures, 5 tables, Published with "International Journal of Engineering Trends and Technology (IJETT)". arXiv admin note: text overlap with arXiv:1208.5997 by other authors without attribution
Journal-ref: International Journal of Engineering Trends and Technology (IJETT), V9(10),501-512 March 2014
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43] arXiv:1403.7922 [pdf, other]
Title: On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion
R. Aragona, M. Calderini, D. Maccauro, M. Sala
Comments: to appear in Applicable Algebra in Engineering, Communication and Computing
Journal-ref: AAECC 27 (5), 359-372 (2016)
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:1403.8084 [pdf, other]
Title: Privacy Tradeoffs in Predictive Analytics
Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft
Comments: Extended version of the paper appearing in SIGMETRICS 2014
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45] arXiv:1403.8137 [pdf, other]
Title: Secure and scalable match: overcoming the universal circuit bottleneck using group programs
Rajesh Krishnan, Ravi Sundaram
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1403.8150 [pdf, other]
Title: On the Incremental Asymmetric Signatures
Kevin Atighehchi
Comments: Preliminary version
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1403.0126 (cross-list from math.AG) [pdf, other]
Title: Point compression for the trace zero subgroup over a small degree extension field
Elisa Gorla, Maike Massierer
Comments: 23 pages, to appear in Designs, Codes and Cryptography
Subjects: Algebraic Geometry (math.AG); Cryptography and Security (cs.CR)
[48] arXiv:1403.0505 (cross-list from math.OC) [pdf, other]
Title: A search for quantum coin-flipping protocols using optimization techniques
Ashwin Nayak, Jamie Sikora, Levent Tunçel
Comments: 74 pages (plus 16 page appendix), 27 tables, 3 figures. Comments welcome
Journal-ref: Mathematical Programming, March 2016, Volume 156, Issue 1, pp 581-613
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[49] arXiv:1403.1097 (cross-list from quant-ph) [pdf, other]
Title: Quantum secret sharing based on local distinguishability
Ramij Rahaman, Matthew G. Parker
Comments: 7 pages, Comments are welcome
Journal-ref: Phys. Rev. A 91, 022330 (2015)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Mathematical Physics (math-ph)
[50] arXiv:1403.1694 (cross-list from cs.PL) [pdf, other]
Title: Methods of executable code protection
Anton Petrov
Comments: 11 pages, 5 figures
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
Total of 68 entries : 1-25 26-50 51-68
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack