Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2014

Total of 85 entries : 1-25 26-50 51-75 76-85
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1410.0030 [pdf, other]
Title: Privacy by Design: From Technologies to Architectures (Position Paper)
Thibaud Antignac (Inria Grenoble Rhône-Alpes / CITI Insa de Lyon), Daniel Le Métayer (Inria Grenoble Rhône-Alpes / CITI Insa de Lyon, CITI)
Journal-ref: APF - Annual Privacy Forum 2014 8450 (2014) 1-17
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1410.0151 [pdf, other]
Title: Exploiting Social Navigation
Meital Ben Sinai, Nimrod Partush, Shir Yadid, Eran Yahav
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1410.0382 [pdf, other]
Title: A String-Based Public Key Cryptosystem
M. Andrecut
Comments: In this revised version of the paper we show that the eavesdropper's problem of the proposed cryptosystem has a solution, and we give the details of the solution
Subjects: Cryptography and Security (cs.CR); Data Analysis, Statistics and Probability (physics.data-an)
[4] arXiv:1410.0534 [pdf, other]
Title: Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies
Fredrick Romanus Ishengoma
Journal-ref: CiiT International Journal of Programmable Device Circuits and Systems, Volume 6, Issue 6, August 2014
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1410.0983 [pdf, other]
Title: Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption
Marcos Portnoi, Chien-Chung Shen
Comments: Accepted at International Conference on Computing, Networking and Communications (ICNC 2015)
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1410.1040 [pdf, other]
Title: Alltagstaugliche Biometrie: Entwicklungen, Herausforderungen und Chancen
Stefan G. Weber
Comments: in German
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[7] arXiv:1410.1120 [pdf, other]
Title: Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata
Comments: 25 pages. Submitted to IEEE Trans. Inf. Theory
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[8] arXiv:1410.1158 [pdf, other]
Title: Technical Information on Vulnerabilities of Hypercall Handlers
Aleksandar Milenkoski, Marco Vieira, Bryan D. Payne, Nuno Antunes, Samuel Kounev
Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1410.1160 [pdf, other]
Title: On Benchmarking Intrusion Detection Systems in Virtualized Environments
Aleksandar Milenkoski, Samuel Kounev, Alberto Avritzer, Nuno Antunes, Marco Vieira
Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[10] arXiv:1410.1228 [pdf, other]
Title: Interactive Fingerprinting Codes and the Hardness of Preventing False Discovery
Thomas Steinke, Jonathan Ullman
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[11] arXiv:1410.1389 [pdf, other]
Title: A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems
Sriram N. Premnath, Zygmunt J. Haas
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1410.1490 [pdf, other]
Title: Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[13] arXiv:1410.1613 [pdf, other]
Title: Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee
Devu Manikantan Shila, Xianghui Cao, Yu Cheng, Zequ Yang, Yang Zhou, Jiming Chen
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[14] arXiv:1410.1639 [pdf, other]
Title: An Anonymous Communication Scheme based on Ring Signature in VANETs
Yichen Jiang, Yi Ji, Tianhua Liu
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1410.1735 [pdf, other]
Title: A Covert Channel Based on Web Read-time Modulation
Joshua Davis
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1410.1823 [pdf, other]
Title: Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[17] arXiv:1410.2023 [pdf, other]
Title: Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review
Kennedy Edemacu, Martin Euku, Richard Ssekibuule
Comments: 12 pages
Journal-ref: International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1410.2123 [pdf, other]
Title: Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
George Grispos, Tim Storer, William Bradley Glisson
Journal-ref: G. Grispos, T. Storer, and W.B. Glisson (2012). Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. International Journal of Digital Crime and Forensics, Volume 4, Issue 2, Pages 28-48
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1410.2131 [pdf, other]
Title: A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
Waqas Aman
Comments: 12 pages
Journal-ref: International Journal of Network Security & Its Applications 09/2014; 6(5):63-74
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1410.2620 [pdf, other]
Title: Secure Key Establishment for Device-to-Device Communications
Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng
Comments: 5 pages, 4 figures, accepted to IEEE Globecom
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[21] arXiv:1410.2862 [pdf, other]
Title: On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Rafael Dowsley, Anderson C. A. Nascimento
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[22] arXiv:1410.3041 [pdf, other]
Title: Risk Assessment Algorithm in Wireless Sensor Networks using Beta Distribution
Mohammad Momani, Maen Takruri, Rami Al-Hmouz
Journal-ref: IJCNC, September 2014, Volume 6, number 5
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[23] arXiv:1410.3226 [pdf, other]
Title: Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention
Joaquin Garcia-Alfaro (Institut Mines-Télécom, Télécom SudParis), Gürkan Gür (Provus)
Journal-ref: EPTCS 165, 2014
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Operating Systems (cs.OS)
[24] arXiv:1410.3270 [pdf, other]
Title: POSTER: Privacy-preserving Indoor Localization
Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze, Klaus Wehrle
Comments: Poster Session of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'14)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1410.4019 [pdf, other]
Title: An Automated Group Key Authentication System Using Secret Image Sharing Scheme
Dipak Kumar Kole, Subhadip Basu
Journal-ref: Proceedings of the International Conference on Recent trends in Information Systems (IRIS-06), pp. 98-106, Kovilpatti, Tamil Nadu, India, 2006
Subjects: Cryptography and Security (cs.CR)
Total of 85 entries : 1-25 26-50 51-75 76-85
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack