Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2014

Total of 85 entries
Showing up to 2000 entries per page: fewer | more | all
[26] arXiv:1410.4095 [pdf, other]
Title: Higher Order Differentiation over Finite Fields with Applications to Generalising the Cube Attack
Ana Sălăgean, Matei Mandache-Sălăgean, Richard Winter, Raphael C.-W. Phan
Comments: submitted to a journal
Journal-ref: Designs Codes Cryptography 84, 425-449 (2017)
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1410.4147 [pdf, other]
Title: Mobile Agent Systems, Recent Security Threats and Counter Measures
Belal Amro
Comments: international journal of computer science issues, march 2014
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1410.4207 [pdf, other]
Title: XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners
Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1410.4303 [pdf, other]
Title: Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices
Nourhene Ellouze (Communication Networks and Security Research Lab, University of Carthage, Tunisia), Slim Rekhis (Communication Networks and Security Research Lab, University of Carthage, Tunisia), Mohamed Allouche (Department of Forensic Medicine of Charles Nicolle, University of Tunis El Manar, Tunisia), Noureddine Boudriga (Communication Networks and Security Research Lab, University of Carthage, Tunisia)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 15-30
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[30] arXiv:1410.4304 [pdf, other]
Title: USBcat - Towards an Intrusion Surveillance Toolset
Chris Chapman (Royal Military College of Canada, Electrical and Computer Engineering Department, Kingston, Canada), Scott Knight (Royal Military College of Canada, Electrical and Computer Engineering Department, Kingston, Canada), Tom Dean (Queen's University, Electrical and Computer Engineering Department, Kingston, Canada)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 31-43
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1410.4305 [pdf, other]
Title: Model the System from Adversary Viewpoint: Threats Identification and Modeling
Muhammad Sabir Idrees (Institut Mines-Télécom, Télécom Bretagne, France), Yves Roudier (Institut EURECOM, France), Ludovic Apvrille (Institut Mines-Télécom, Télécom ParisTech, France)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 45-58
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE); Systems and Control (eess.SY)
[32] arXiv:1410.4312 [pdf, other]
Title: Zero-Correlation Linear Cryptanalysis of Reduced-round MISTY1
Wentan Yi, Shaozhen Chen
Comments: arXiv admin note: substantial text overlap with arXiv:1404.6100
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1410.4398 [pdf, other]
Title: Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
B. Issac
Comments: 12 pages. available in Issac, B. (2009). Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks, International Journal of Network Security (IJNS), ISSN 1816-353X (print), ISSN 1816-3548 (online), 8(1), 102-113
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1410.4617 [pdf, other]
Title: A Cut Principle for Information Flow
Joshua D. Guttman, Paul D. Rowe
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1410.4672 [pdf, other]
Title: Analysis of Phishing Attacks and Countermeasures
B. Issac, R. Chiong, S.M. Jacob
Comments: 8 pages
Journal-ref: Issac, B., Chiong, R. & Jacob, S. M. (2006, June). Analysis of Phishing Attacks and Countermeasures. IBIMA, Bonn, Germany, ISBN 0-9753393-5-4, pp.339-346
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1410.4795 [pdf, other]
Title: Security - a perpetual war: lessons from nature
Wojciech Mazurczyk, Elżbieta Rzeszutko
Comments: 15 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:1410.4917 [pdf, other]
Title: Type-Directed Compilation for Fault-Tolerant Non-Interference
Filippo Del Tedesco, David Sands, Alejandro Russo
Comments: Extended version, 77 pages
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1410.4978 [pdf, other]
Title: Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics
Muhammad Haris, Hamed Haddadi, Pan Hui
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1410.5021 [pdf, other]
Title: Unshared Secret Key Cryptography
Shuiyin Liu, Yi Hong, Emanuele Viterbo
Comments: 13 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1410.5567 [pdf, other]
Title: Cryptographic Enforcement of Information Flow Policies without Public Information
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering
Comments: To appear in Proceedings of ACNS 2015
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1410.5696 [pdf, other]
Title: DAPriv: Decentralized architecture for preserving the privacy of medical data
Rajesh Sharma, Deepak Subramanian, Satish N. Srirama
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[42] arXiv:1410.5789 [pdf, other]
Title: Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study
Mohamed H. E. Aouadi, Khalifa Toumi, Ana Cavalli
Comments: 10 pages, 13 figures, published in IJCSI. ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 this http URL
Journal-ref: IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 5, No 2, September 2014
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[43] arXiv:1410.5904 [pdf, other]
Title: Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques
Bhavya Kailkhura, Swastik Brahma, Berkan Dulek, Yunghsiang S Han, Pramod K. Varshney
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC); Applications (stat.AP)
[44] arXiv:1410.6079 [pdf, other]
Title: Bitcoin over Tor isn't a good idea
Alex Biryukov, Ivan Pustogarov
Comments: 11 pages, 4 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:1410.6295 [pdf, other]
Title: Enhanced TKIP Michael Attacks
Martin Beck
Comments: 10 pages, 7 figures. Report was written in 2010, referenced several times in relevant literature
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1410.6582 [pdf, other]
Title: Enable Portrait Privacy Protection in Photo Capturing and Sharing
Lan Zhang, Kebin Liu, Xiang-Yang Li, Puchun Feng, Cihang Liu, Yunhao Liu
Comments: 9 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1410.6589 [pdf, other]
Title: Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection
Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu
Comments: 10 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1410.6593 [pdf, other]
Title: Cloud-based Privacy Preserving Image Storage, Sharing and Search
Lan Zhang, Taeho Jung, Puchun Feng, Xiang-Yang Li, Yunhao Liu
Comments: 15 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1410.6629 [pdf, other]
Title: That Ain't You: Detecting Spearphishing Emails Before They Are Sent
Gianluca Stringhini, Olivier Thonnard
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1410.6674 [pdf, other]
Title: Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014
Larry Koved, Kapil Singh, Hao Chen, Mike Just
Comments: 10 papers in the proceedings (of 11 presented at the MoST 2014 workshop)
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:1410.6739 [pdf, other]
Title: Automated Cryptanalysis of Bloom Filter Encryptions of Health Records
Martin Kroll, Simone Steinmetzer
Comments: Contribution to the 8th International Conference on Health Informatics, Lisbon 2015
Subjects: Cryptography and Security (cs.CR)
[52] arXiv:1410.7190 [pdf, other]
Title: Repairable Threshold Secret Sharing Schemes
Xuan Guang, Jiyong Lu, Fang-Wei Fu
Comments: One column and 17 pages, submitted for publication
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[53] arXiv:1410.7340 [pdf, other]
Title: Efficient Key Generation for Dynamic Blom's Scheme
Divya Harika Nagabhyrava
Comments: 17 pages, 10 figures. arXiv admin note: text overlap with arXiv:1103.5712 by other authors
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:1410.7540 [pdf, other]
Title: Fisher-Yates Chaotic Shuffling Based Image Encryption
Swaleha Saeed, M Sarosh Umar, M Athar Ali, Musheer Ahmad
Journal-ref: International Journal of Information Processing, 8(3), 31-41, 2014 ISSN : 0973-8215 IK International Publishing House Pvt. Ltd., New Delhi, India
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[55] arXiv:1410.7694 [pdf, other]
Title: Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Chengqing Li, Bingbing Feng, Shujun Li, Juergen Kurths, Guanrong Chen
Comments: 14 pages, 20 figures
Journal-ref: IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66, 2019
Subjects: Cryptography and Security (cs.CR); Chaotic Dynamics (nlin.CD)
[56] arXiv:1410.7743 [pdf, other]
Title: Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
Hilmi Gunes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:1410.7744 [pdf, other]
Title: Differentially Private Location Privacy in Practice
Vincent Primault, Sonia Ben Mokhtar, Cedric Lauradoux, Lionel Brunie
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:1410.7745 [pdf, other]
Title: An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities
Vasant Tendulkar, William Enck
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:1410.7746 [pdf, other]
Title: Two Novel Defenses against Motion-Based Keystroke Inference Attacks
Yihang Song, Madhur Kukreti, Rahul Rawat, Urs Hengartner
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1410.7747 [pdf, other]
Title: Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture
Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[61] arXiv:1410.7749 [pdf, other]
Title: Enter Sandbox: Android Sandbox Comparison
Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, Edgar Weippl
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:1410.7751 [pdf, other]
Title: Andlantis: Large-scale Android Dynamic Analysis
Michael Bierma, Eric Gustafson, Jeremy Erickson, David Fritz, Yung Ryn Choe
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1410.7752 [pdf, other]
Title: A Systematic Security Evaluation of Android's Multi-User Framework
Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:1410.7754 [pdf, other]
Title: A First Look at Firefox OS Security
Daniel Defreez, Bhargava Shastry, Hao Chen, Jean-Pierre Seifert
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[65] arXiv:1410.7756 [pdf, other]
Title: Code Injection Attacks on HTML5-based Mobile Apps
Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du
Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:1410.8082 [pdf, other]
Title: Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects
Reginald D. Smith
Comments: 13 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Populations and Evolution (q-bio.PE)
[67] arXiv:1410.8317 [pdf, other]
Title: Insights from Nature for Cybersecurity
Elzbieta Rzeszutko, Wojciech Mazurczyk
Comments: 12 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1410.8747 [pdf, other]
Title: CONDENSER: A Graph-Based Approachfor Detecting Botnets
Pedro Camelo, Joao Moura, Ludwig Krippahl
Comments: BotConf 2014
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:1410.1434 (cross-list from quant-ph) [pdf, other]
Title: Quantum attacks against iterated block ciphers
Marc Kaplan
Comments: 14 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[70] arXiv:1410.2011 (cross-list from cs.SC) [pdf, other]
Title: On Ideal Lattices, Gröbner Bases and Generalized Hash Functions
Maria Francis, Ambedkar Dukkipati
Comments: arXiv admin note: text overlap with arXiv:1409.7788
Subjects: Symbolic Computation (cs.SC); Cryptography and Security (cs.CR)
[71] arXiv:1410.2182 (cross-list from math.NT) [pdf, other]
Title: Linear complexity problems of level sequences of Euler quotients and their related binary sequences
Zhihua Niu, Zhixiong Chen, Xiaoni Du
Comments: 16 pages
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[72] arXiv:1410.2435 (cross-list from quant-ph) [pdf, other]
Title: Quantum fully homomorphic encryption scheme based on universal quantum circuit
Min Liang
Comments: 10 pages, 1 figure
Journal-ref: Quantum Information Processing, Volume 14, Issue 8 (2015), Page 2749-2759
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[73] arXiv:1410.2470 (cross-list from cs.DS) [pdf, other]
Title: Randomness Efficient Fast-Johnson-Lindenstrauss Transform with Applications in Differential Privacy and Compressed Sensing
Jalaj Upadhyay
Comments: Corrected a mistake in the proof and few small typos
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[74] arXiv:1410.2553 (cross-list from cs.DC) [pdf, other]
Title: XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments
Bishoy Moussa, Mahmoud Mostafa, Mahmoud El-Khouly
Comments: XML, JSON, Minification, XML Schema, Cloud, Log, Communication, Compression, XMill, GZip, Code Generation, Code Readability, 9 pages, 12 figures, 5 tables, Journal Article
Journal-ref: International Journal of Advanced Computer Science and Applications (IJACSA), 5(9), 2014
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[75] arXiv:1410.2960 (cross-list from cs.IT) [pdf, other]
Title: Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels
Shihao Yan, Robert Malaney, Ido Nevat, Gareth W. Peters
Comments: 6 pages, 5 figures, Added further clarification on constraints imposed on the detection minimization strategy. Minor typos fixed
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[76] arXiv:1410.3735 (cross-list from cs.PL) [pdf, other]
Title: The Foundational Cryptography Framework
Adam Petcher, Greg Morrisett
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[77] arXiv:1410.3812 (cross-list from cs.IT) [pdf, other]
Title: Polar Coding for the General Wiretap Channel
Yi-Peng Wei, Sennur Ulukus
Comments: Submitted to IEEE ITW 2015
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[78] arXiv:1410.5126 (cross-list from quant-ph) [pdf, other]
Title: Strongly Secure Quantum Ramp Secret Sharing Constructed from Algebraic Curves over Finite Fields
Ryutaroh Matsumoto
Comments: this http URL, 8 pages, no figure
Journal-ref: Advances in Mathematics of Communications, vol. 13, no. 1, pp. 1-10, February 2019
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT); Algebraic Geometry (math.AG)
[79] arXiv:1410.5919 (cross-list from cs.DB) [pdf, other]
Title: Protecting Locations with Differential Privacy under Temporal Correlations
Yonghui Xiao, Li Xiong
Comments: Final version Nov-04-2015
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[80] arXiv:1410.6592 (cross-list from cs.MM) [pdf, other]
Title: Hiding Sound in Image by K-LSB Mutation
Ankur Gupta, Ankit Chaudhary
Comments: appears in ISCBI 2014
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[81] arXiv:1410.6656 (cross-list from cs.MM) [pdf, other]
Title: StegExpose - A Tool for Detecting LSB Steganography
Benedikt Boehm
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[82] arXiv:1410.6796 (cross-list from cs.MM) [pdf, other]
Title: Steganography in Modern Smartphones and Mitigation Techniques
Wojciech Mazurczyk, Luca Caviglione
Comments: 25 pages, 8 figures, 6 tables
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[83] arXiv:1410.7709 (cross-list from cs.LG) [pdf, other]
Title: Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection
Antti Juvonen, Tuomo Sipola
Comments: 35 pages, 12 figures, 7 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[84] arXiv:1410.8100 (cross-list from cs.IT) [pdf, other]
Title: Design of Binary Quantizers for Distributed Detection under Secrecy Constraints
V. Sriram Siddhardh Nadendla, Pramod K. Varshney
Comments: 13 pages, 7 figures; Submitted to IEEE Transactions in Signal Processing
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[85] arXiv:1410.8794 (cross-list from cs.IT) [pdf, other]
Title: Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel
Shahid Mehraj Shah, Vinod Sharma
Comments: 6 pages, 1 figure, Submitted to IEEE WCNC 2015, New Orleans, USA
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
Total of 85 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack