close this message
arXiv smileybones

arXiv Is Hiring a DevOps Engineer

Work on one of the world's most important websites and make an impact on open science.

View Jobs
Skip to main content
Cornell University

arXiv Is Hiring a DevOps Engineer

View Jobs
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2014

Total of 54 entries : 1-50 51-54
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:1406.0090 [pdf, other]
Title: Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem
Arjun Puri, Sudesh Kumar
Comments: 6 pages, 2 figures
Journal-ref: International Journal of Computer Applications 92(1):1-6, April 2014
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1406.0342 [pdf, other]
Title: A faster method for computing Gama-Nguyen-Regev's extreme pruning coefficients
Yoshinori Aono
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1406.0373 [pdf, other]
Title: Linear Programming Relaxations for Goldreich's Generators over Non-Binary Alphabets
Ryuhei Mori, Takeshi Koshiba, Osamu Watanabe, Masaki Yamamoto
Comments: 14 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Information Theory (cs.IT)
[4] arXiv:1406.0866 [pdf, other]
Title: Subspace Methods for Data Attack on State Estimation: A Data Driven Approach
Jinsub Kim, Lang Tong, Robert J. Thomas
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1406.1033 [pdf, other]
Title: Identity Management issues in Cloud Computing
Smita Saini, Deep Mann
Comments: 3 pages."Published with International Journal of Computer Trends and Technology (IJCTT)"
Journal-ref: IJCTT V9(8):414-416, March 2014
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1406.1154 [pdf, other]
Title: Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms
Benjamin Tams
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1406.1213 [pdf, other]
Title: On Covert Acoustical Mesh Networks in Air
Michael Hanspach, Michael Goetz
Comments: 10 pages, updated version
Journal-ref: Journal of Communications 8(11), Nov. 2013
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Sound (cs.SD)
[8] arXiv:1406.1543 [pdf, other]
Title: Untappable key distribution system: a one-time-pad booster
Geraldo A. Barbosa, Jeroen van de Graaf
Comments: 12 pages, 16 figures
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[9] arXiv:1406.1795 [pdf, other]
Title: Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review
Nusrat Fatema, Remus Brad
Journal-ref: International Journal of Computer Networking and Communication, vol. 2 (2), pp. 1-9, May 2014
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[10] arXiv:1406.1823 [pdf, other]
Title: Multi-user protocols with access control for computational privacy in public clouds
Sashank Dara
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1406.2146 [pdf, other]
Title: Digital Watermarking Techniques in Spatial and Frequency Domain
Tanmoy Sarkar, Sugata Sanyal
Comments: 5 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1406.2285 [pdf, other]
Title: A Piggybank Protocol for Quantum Cryptography
Navya Chodisetti
Comments: 6 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1406.2568 [pdf, other]
Title: Quantifying the Utility-Privacy Tradeoff in the Smart Grid
Roy Dong, Alvaro A. Cárdenas, Lillian J. Ratliff, Henrik Ohlsson, S. Shankar Sastry
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1406.2901 [pdf, other]
Title: A Pattern-based Survey and Categorization of Network Covert Channel Techniques
Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin
Comments: 27 pages, 4 figures, 3 tables, accepted for publication in ACM Computing Surveys (CSUR, submitted on Dec-2013, accepted in Oct-2014). The final publication will be available via ACM
Journal-ref: ACM Computing Surveys, Vol. 47(3), ACM, 2015
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1406.2930 [pdf, other]
Title: Improved Secure Address Resolution Protocol
Abhishek Samvedi, Sparsh Owlak, Vijay Kumar Chaurasia
Comments: 10 pages, 15 figures, paper selected in fifth international conference of communications security and information assurance 2014
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1406.3074 [pdf, other]
Title: A New Result on the Random Residue Sequence Algorithm
Vamsi Sashank Kotagiri
Comments: 6 pages,2 tables
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1406.3240 [pdf, other]
Title: Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT
Wentan Yi, Shaozhen Chen, Kuanyang Wei
Comments: arXiv admin note: text overlap with arXiv:1404.6100
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1406.3583 [pdf, other]
Title: Representing Network Trust and Using It to Improve Anonymous Communication
Aaron D. Jaggard, Aaron Johnson, Paul Syverson, Joan Feigenbaum
Comments: 24 pages; talk to be presented at HotPETs 2014
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1406.3687 [pdf, other]
Title: bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
Neha Gupta, Anupama Aggarwal, Ponnurangam Kumaraguru
Comments: arXiv admin note: substantial text overlap with arXiv:1405.1511
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1406.3943 [pdf, other]
Title: Cryptanalysis of Cryptanalysis and Improvement of Yan et al Biometric-Based Authentication Scheme for TMIS
Mrudula Sarvabhatla, M.Giri, Chandra Sekhar Vorugunti
Comments: arXiv admin note: text overlap with arXiv:1309.4944 by other authors
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1406.4053 [pdf, other]
Title: Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks
John Maheswaran, Daniel Jackowitz, David Isaac Wolinsky, Lining Wang, Bryan Ford
Comments: 9 figures
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1406.4285 [pdf, other]
Title: C-sanitized: a privacy model for document redaction and sanitization
David Sanchez, Montserrat Batet
Comments: in Journal of the Association for Information Science and Technology, 2015
Journal-ref: Journal of the Association for Information Science and Technology, Volume 67, Issue 1 (2016)
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1406.4516 [pdf, other]
Title: Classification of Attacks in Wireless Sensor Networks
Mohamed-Lamine Messai
Comments: International Congress on Telecommunication and Application 2014
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1406.4681 [pdf, other]
Title: Crypto multi tenant: an environment of secure computing using cloud sql
Parul Kashyap, Rahul Singh
Comments: 9 pages, 5 figures, IEEE journals, connferences 2009,2010; springer
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1406.4748 [pdf, other]
Title: A New Advanced User Authentication and Confidentiality Security Service
Sanjay Majumder, Sanjay Chakraborty, Suman Das
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1406.4844 [pdf, other]
Title: Beam-forming for Secure Communication in Amplify-and-Forward Networks: An SNR based approach
Siddhartha Sarma, Samar Agnihotri, Joy Kuri
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1406.4988 [pdf, other]
Title: Path Conditions and Principal Matching: A New Approach to Access Control
Jason Crampton, James Sellwood
Comments: Accepted for publication at SACMAT 2014
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1406.5440 [pdf, other]
Title: Operational Distributed Regulation for Bitcoin
Dinesh, Erlich, Gilfoyle, Jared, Richard, Johan Pouwelse
Comments: 9 pages report by students who desire to remain anonymous
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC)
[29] arXiv:1406.5569 [pdf, other]
Title: On the Reverse Engineering of the Citadel Botnet
Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi
Comments: 10 pages, 17 figures. This is an updated / edited version of a paper appeared in FPS 2013
Journal-ref: LNCS 8352, 2014, pp 408-425
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Operating Systems (cs.OS); Software Engineering (cs.SE)
[30] arXiv:1406.5596 [pdf, other]
Title: An Epitome of Multi Secret Sharing Schemes for General Access Structure
V P Binu, A Sreekumar
Journal-ref: International Journal of Information Processing, 8(2), 13-28, 2014 ISSN : 0973-8215
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1406.5694 [pdf, other]
Title: Cryptocurrencies without Proof of Work
Iddo Bentov, Ariel Gabizon, Alex Mizrahi
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1406.5720 [pdf, other]
Title: Publicly Verifiable Outsourced Computation with a Key Distribution Centre
James Alderman, Carlos Cid, Jason Crampton, Christian Janson
Comments: Conference version
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1406.5751 [pdf, other]
Title: Computing on Masked Data: a High Performance Method for Improving Big Data Veracity
Jeremy Kepner, Vijay Gadepally, Pete Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham (MIT)
Comments: to appear in IEEE High Performance Extreme Computing 2014 (this http URL)
Subjects: Cryptography and Security (cs.CR); Instrumentation and Methods for Astrophysics (astro-ph.IM); Databases (cs.DB); Information Retrieval (cs.IR)
[34] arXiv:1406.6046 [pdf, other]
Title: Hybrid Epidemics - A Case Study on Computer Worm Conficker
Changwang Zhang, Shi Zhou, Benjamin M. Chain
Journal-ref: PLoS ONE. 2015 May 15;10(5):e0127478
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[35] arXiv:1406.6221 [pdf, other]
Title: Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, Pradeep Sinha, Gaur Sunder, Prashant Bendale, Sayali Pophalkar
Comments: 8 pages, 4 figures, Fifth International Conference on Communications Security & Information Assurance (CSIA 2014) May 24~25, 2014, Delhi, India
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1406.6647 [pdf, other]
Title: Extract Secrets from Wireless Channel: A New Shape-based Approach
Yue Qiao, Kannan Srinivasan, Anish Arora
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[37] arXiv:1406.6854 [pdf, other]
Title: A Fully Automated Latent Fingerprint Matcher with Embedded Self-learning Segmentation Module
Jinwei Xu, Jiankun Hu, Xiuping Jia
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[38] arXiv:1406.7061 [pdf, other]
Title: Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
Ashu Sharma, S.K. Sahay
Comments: 5 Pages
Journal-ref: International Journal of Computer Applications, 2014, Vol. 90, No. 2, p. 7
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1406.7078 [pdf, other]
Title: Close to Uniform Prime Number Generation With Fewer Random Bits
Pierre-Alain Fouque, Mehdi Tibouchi
Comments: Full version of ICALP 2014 paper. Alternate version of IACR ePrint Report 2011/481
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[40] arXiv:1406.7377 [pdf, other]
Title: A New Approach for Finding Cloned Profiles in Online Social Networks
Morteza Yousefi Kharaji, Fatemeh Salehi Rizi, Mohammad Reza Khayyambashi
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[41] arXiv:1406.0298 (cross-list from cs.NI) [pdf, other]
Title: Analysis of Security Threats in Wireless Sensor Network
Sahabul Alam, Debashis De
Comments: 12 pages, 2 figures. arXiv admin note: substantial text overlap with arXiv:0712.4169 by other authors
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[42] arXiv:1406.0589 (cross-list from quant-ph) [pdf, other]
Title: Post-processing of the oblivious key in quantum private queries
Fei Gao, Bin Liu, Wei Huang, Qiao-Yan Wen
Comments: 11 pages, 5 figures, 3 tables
Journal-ref: Ieee Journal Of Selected Topics In Quantum Electronics, VOL. 21, NO. 3, 6600111, 2015
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[43] arXiv:1406.1049 (cross-list from cs.DM) [pdf, other]
Title: Fourier Transforms and Bent Functions on Finite Abelian Group-Acted Sets
Yun Fan, Bangteng Xu
Subjects: Discrete Mathematics (cs.DM); Cryptography and Security (cs.CR); Representation Theory (math.RT)
[44] arXiv:1406.2041 (cross-list from cs.SE) [pdf, other]
Title: Platform-Centric Android Monitoring---Modular and Efficient
Jan-Christoph Kuester, Andreas Bauer
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[45] arXiv:1406.2456 (cross-list from quant-ph) [pdf, other]
Title: Limitations on information theoretically secure quantum homomorphic encryption
Li Yu, Carlos A. Perez-Delgado, Joseph F. Fitzsimons
Comments: 4 pages, 1 figure
Journal-ref: Phys. Rev. A 90, 050303 (2014)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[46] arXiv:1406.2519 (cross-list from cs.MM) [pdf, other]
Title: On Importance of Steganographic Cost For Network Steganography
Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski
Comments: 15 pages, 14 figures, 3 tables
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[47] arXiv:1406.2791 (cross-list from cs.SE) [pdf, other]
Title: A new approach for formal behavioral modeling of protection services in antivirus systems
Monire Norouzi, Saeed Parsa, Ali Mahjur
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[48] arXiv:1406.3002 (cross-list from cs.HC) [pdf, other]
Title: The Effect of Visual Noise on The Completion of Security Critical Tasks
Tyler Kaczmarek, Alfed Kobsa, Robert Sy, Gene Tsudik
Comments: 10 pages, 5 figures
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[49] arXiv:1406.3103 (cross-list from cs.IT) [pdf, other]
Title: Deception with Side Information in Biometric Authentication Systems
Wei Kang, Daming Cao, Nan Liu
Comments: Submitted to IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[50] arXiv:1406.3110 (cross-list from cs.DL) [pdf, other]
Title: Reaction to New Security Threat Class
Yuval Elovici, Lior Rokach
Subjects: Digital Libraries (cs.DL); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
Total of 54 entries : 1-50 51-54
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack