Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2014

Total of 85 entries : 1-50 51-85
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:1410.0030 [pdf, other]
Title: Privacy by Design: From Technologies to Architectures (Position Paper)
Thibaud Antignac (Inria Grenoble Rhône-Alpes / CITI Insa de Lyon), Daniel Le Métayer (Inria Grenoble Rhône-Alpes / CITI Insa de Lyon, CITI)
Journal-ref: APF - Annual Privacy Forum 2014 8450 (2014) 1-17
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1410.0151 [pdf, other]
Title: Exploiting Social Navigation
Meital Ben Sinai, Nimrod Partush, Shir Yadid, Eran Yahav
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1410.0382 [pdf, other]
Title: A String-Based Public Key Cryptosystem
M. Andrecut
Comments: In this revised version of the paper we show that the eavesdropper's problem of the proposed cryptosystem has a solution, and we give the details of the solution
Subjects: Cryptography and Security (cs.CR); Data Analysis, Statistics and Probability (physics.data-an)
[4] arXiv:1410.0534 [pdf, other]
Title: Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies
Fredrick Romanus Ishengoma
Journal-ref: CiiT International Journal of Programmable Device Circuits and Systems, Volume 6, Issue 6, August 2014
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1410.0983 [pdf, other]
Title: Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption
Marcos Portnoi, Chien-Chung Shen
Comments: Accepted at International Conference on Computing, Networking and Communications (ICNC 2015)
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1410.1040 [pdf, other]
Title: Alltagstaugliche Biometrie: Entwicklungen, Herausforderungen und Chancen
Stefan G. Weber
Comments: in German
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[7] arXiv:1410.1120 [pdf, other]
Title: Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata
Comments: 25 pages. Submitted to IEEE Trans. Inf. Theory
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[8] arXiv:1410.1158 [pdf, other]
Title: Technical Information on Vulnerabilities of Hypercall Handlers
Aleksandar Milenkoski, Marco Vieira, Bryan D. Payne, Nuno Antunes, Samuel Kounev
Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1410.1160 [pdf, other]
Title: On Benchmarking Intrusion Detection Systems in Virtualized Environments
Aleksandar Milenkoski, Samuel Kounev, Alberto Avritzer, Nuno Antunes, Marco Vieira
Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[10] arXiv:1410.1228 [pdf, other]
Title: Interactive Fingerprinting Codes and the Hardness of Preventing False Discovery
Thomas Steinke, Jonathan Ullman
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[11] arXiv:1410.1389 [pdf, other]
Title: A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems
Sriram N. Premnath, Zygmunt J. Haas
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1410.1490 [pdf, other]
Title: Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[13] arXiv:1410.1613 [pdf, other]
Title: Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee
Devu Manikantan Shila, Xianghui Cao, Yu Cheng, Zequ Yang, Yang Zhou, Jiming Chen
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[14] arXiv:1410.1639 [pdf, other]
Title: An Anonymous Communication Scheme based on Ring Signature in VANETs
Yichen Jiang, Yi Ji, Tianhua Liu
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1410.1735 [pdf, other]
Title: A Covert Channel Based on Web Read-time Modulation
Joshua Davis
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1410.1823 [pdf, other]
Title: Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[17] arXiv:1410.2023 [pdf, other]
Title: Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review
Kennedy Edemacu, Martin Euku, Richard Ssekibuule
Comments: 12 pages
Journal-ref: International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1410.2123 [pdf, other]
Title: Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
George Grispos, Tim Storer, William Bradley Glisson
Journal-ref: G. Grispos, T. Storer, and W.B. Glisson (2012). Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. International Journal of Digital Crime and Forensics, Volume 4, Issue 2, Pages 28-48
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1410.2131 [pdf, other]
Title: A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
Waqas Aman
Comments: 12 pages
Journal-ref: International Journal of Network Security & Its Applications 09/2014; 6(5):63-74
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1410.2620 [pdf, other]
Title: Secure Key Establishment for Device-to-Device Communications
Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng
Comments: 5 pages, 4 figures, accepted to IEEE Globecom
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[21] arXiv:1410.2862 [pdf, other]
Title: On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Rafael Dowsley, Anderson C. A. Nascimento
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[22] arXiv:1410.3041 [pdf, other]
Title: Risk Assessment Algorithm in Wireless Sensor Networks using Beta Distribution
Mohammad Momani, Maen Takruri, Rami Al-Hmouz
Journal-ref: IJCNC, September 2014, Volume 6, number 5
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[23] arXiv:1410.3226 [pdf, other]
Title: Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention
Joaquin Garcia-Alfaro (Institut Mines-Télécom, Télécom SudParis), Gürkan Gür (Provus)
Journal-ref: EPTCS 165, 2014
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Operating Systems (cs.OS)
[24] arXiv:1410.3270 [pdf, other]
Title: POSTER: Privacy-preserving Indoor Localization
Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze, Klaus Wehrle
Comments: Poster Session of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'14)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1410.4019 [pdf, other]
Title: An Automated Group Key Authentication System Using Secret Image Sharing Scheme
Dipak Kumar Kole, Subhadip Basu
Journal-ref: Proceedings of the International Conference on Recent trends in Information Systems (IRIS-06), pp. 98-106, Kovilpatti, Tamil Nadu, India, 2006
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1410.4095 [pdf, other]
Title: Higher Order Differentiation over Finite Fields with Applications to Generalising the Cube Attack
Ana Sălăgean, Matei Mandache-Sălăgean, Richard Winter, Raphael C.-W. Phan
Comments: submitted to a journal
Journal-ref: Designs Codes Cryptography 84, 425-449 (2017)
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1410.4147 [pdf, other]
Title: Mobile Agent Systems, Recent Security Threats and Counter Measures
Belal Amro
Comments: international journal of computer science issues, march 2014
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1410.4207 [pdf, other]
Title: XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners
Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1410.4303 [pdf, other]
Title: Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices
Nourhene Ellouze (Communication Networks and Security Research Lab, University of Carthage, Tunisia), Slim Rekhis (Communication Networks and Security Research Lab, University of Carthage, Tunisia), Mohamed Allouche (Department of Forensic Medicine of Charles Nicolle, University of Tunis El Manar, Tunisia), Noureddine Boudriga (Communication Networks and Security Research Lab, University of Carthage, Tunisia)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 15-30
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[30] arXiv:1410.4304 [pdf, other]
Title: USBcat - Towards an Intrusion Surveillance Toolset
Chris Chapman (Royal Military College of Canada, Electrical and Computer Engineering Department, Kingston, Canada), Scott Knight (Royal Military College of Canada, Electrical and Computer Engineering Department, Kingston, Canada), Tom Dean (Queen's University, Electrical and Computer Engineering Department, Kingston, Canada)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 31-43
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1410.4305 [pdf, other]
Title: Model the System from Adversary Viewpoint: Threats Identification and Modeling
Muhammad Sabir Idrees (Institut Mines-Télécom, Télécom Bretagne, France), Yves Roudier (Institut EURECOM, France), Ludovic Apvrille (Institut Mines-Télécom, Télécom ParisTech, France)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 45-58
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE); Systems and Control (eess.SY)
[32] arXiv:1410.4312 [pdf, other]
Title: Zero-Correlation Linear Cryptanalysis of Reduced-round MISTY1
Wentan Yi, Shaozhen Chen
Comments: arXiv admin note: substantial text overlap with arXiv:1404.6100
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1410.4398 [pdf, other]
Title: Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
B. Issac
Comments: 12 pages. available in Issac, B. (2009). Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks, International Journal of Network Security (IJNS), ISSN 1816-353X (print), ISSN 1816-3548 (online), 8(1), 102-113
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1410.4617 [pdf, other]
Title: A Cut Principle for Information Flow
Joshua D. Guttman, Paul D. Rowe
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1410.4672 [pdf, other]
Title: Analysis of Phishing Attacks and Countermeasures
B. Issac, R. Chiong, S.M. Jacob
Comments: 8 pages
Journal-ref: Issac, B., Chiong, R. & Jacob, S. M. (2006, June). Analysis of Phishing Attacks and Countermeasures. IBIMA, Bonn, Germany, ISBN 0-9753393-5-4, pp.339-346
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1410.4795 [pdf, other]
Title: Security - a perpetual war: lessons from nature
Wojciech Mazurczyk, Elżbieta Rzeszutko
Comments: 15 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:1410.4917 [pdf, other]
Title: Type-Directed Compilation for Fault-Tolerant Non-Interference
Filippo Del Tedesco, David Sands, Alejandro Russo
Comments: Extended version, 77 pages
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1410.4978 [pdf, other]
Title: Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics
Muhammad Haris, Hamed Haddadi, Pan Hui
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1410.5021 [pdf, other]
Title: Unshared Secret Key Cryptography
Shuiyin Liu, Yi Hong, Emanuele Viterbo
Comments: 13 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1410.5567 [pdf, other]
Title: Cryptographic Enforcement of Information Flow Policies without Public Information
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering
Comments: To appear in Proceedings of ACNS 2015
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1410.5696 [pdf, other]
Title: DAPriv: Decentralized architecture for preserving the privacy of medical data
Rajesh Sharma, Deepak Subramanian, Satish N. Srirama
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[42] arXiv:1410.5789 [pdf, other]
Title: Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study
Mohamed H. E. Aouadi, Khalifa Toumi, Ana Cavalli
Comments: 10 pages, 13 figures, published in IJCSI. ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 this http URL
Journal-ref: IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 5, No 2, September 2014
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[43] arXiv:1410.5904 [pdf, other]
Title: Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques
Bhavya Kailkhura, Swastik Brahma, Berkan Dulek, Yunghsiang S Han, Pramod K. Varshney
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC); Applications (stat.AP)
[44] arXiv:1410.6079 [pdf, other]
Title: Bitcoin over Tor isn't a good idea
Alex Biryukov, Ivan Pustogarov
Comments: 11 pages, 4 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:1410.6295 [pdf, other]
Title: Enhanced TKIP Michael Attacks
Martin Beck
Comments: 10 pages, 7 figures. Report was written in 2010, referenced several times in relevant literature
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1410.6582 [pdf, other]
Title: Enable Portrait Privacy Protection in Photo Capturing and Sharing
Lan Zhang, Kebin Liu, Xiang-Yang Li, Puchun Feng, Cihang Liu, Yunhao Liu
Comments: 9 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1410.6589 [pdf, other]
Title: Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection
Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu
Comments: 10 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1410.6593 [pdf, other]
Title: Cloud-based Privacy Preserving Image Storage, Sharing and Search
Lan Zhang, Taeho Jung, Puchun Feng, Xiang-Yang Li, Yunhao Liu
Comments: 15 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1410.6629 [pdf, other]
Title: That Ain't You: Detecting Spearphishing Emails Before They Are Sent
Gianluca Stringhini, Olivier Thonnard
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1410.6674 [pdf, other]
Title: Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014
Larry Koved, Kapil Singh, Hao Chen, Mike Just
Comments: 10 papers in the proceedings (of 11 presented at the MoST 2014 workshop)
Subjects: Cryptography and Security (cs.CR)
Total of 85 entries : 1-50 51-85
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack