Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2014

Total of 85 entries : 1-25 26-50 51-75 76-85
Showing up to 25 entries per page: fewer | more | all
[26] arXiv:1410.4095 [pdf, other]
Title: Higher Order Differentiation over Finite Fields with Applications to Generalising the Cube Attack
Ana Sălăgean, Matei Mandache-Sălăgean, Richard Winter, Raphael C.-W. Phan
Comments: submitted to a journal
Journal-ref: Designs Codes Cryptography 84, 425-449 (2017)
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1410.4147 [pdf, other]
Title: Mobile Agent Systems, Recent Security Threats and Counter Measures
Belal Amro
Comments: international journal of computer science issues, march 2014
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1410.4207 [pdf, other]
Title: XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners
Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1410.4303 [pdf, other]
Title: Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices
Nourhene Ellouze (Communication Networks and Security Research Lab, University of Carthage, Tunisia), Slim Rekhis (Communication Networks and Security Research Lab, University of Carthage, Tunisia), Mohamed Allouche (Department of Forensic Medicine of Charles Nicolle, University of Tunis El Manar, Tunisia), Noureddine Boudriga (Communication Networks and Security Research Lab, University of Carthage, Tunisia)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 15-30
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[30] arXiv:1410.4304 [pdf, other]
Title: USBcat - Towards an Intrusion Surveillance Toolset
Chris Chapman (Royal Military College of Canada, Electrical and Computer Engineering Department, Kingston, Canada), Scott Knight (Royal Military College of Canada, Electrical and Computer Engineering Department, Kingston, Canada), Tom Dean (Queen's University, Electrical and Computer Engineering Department, Kingston, Canada)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 31-43
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1410.4305 [pdf, other]
Title: Model the System from Adversary Viewpoint: Threats Identification and Modeling
Muhammad Sabir Idrees (Institut Mines-Télécom, Télécom Bretagne, France), Yves Roudier (Institut EURECOM, France), Ludovic Apvrille (Institut Mines-Télécom, Télécom ParisTech, France)
Comments: In Proceedings AIDP 2014, arXiv:1410.3226
Journal-ref: EPTCS 165, 2014, pp. 45-58
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE); Systems and Control (eess.SY)
[32] arXiv:1410.4312 [pdf, other]
Title: Zero-Correlation Linear Cryptanalysis of Reduced-round MISTY1
Wentan Yi, Shaozhen Chen
Comments: arXiv admin note: substantial text overlap with arXiv:1404.6100
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1410.4398 [pdf, other]
Title: Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
B. Issac
Comments: 12 pages. available in Issac, B. (2009). Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks, International Journal of Network Security (IJNS), ISSN 1816-353X (print), ISSN 1816-3548 (online), 8(1), 102-113
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1410.4617 [pdf, other]
Title: A Cut Principle for Information Flow
Joshua D. Guttman, Paul D. Rowe
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1410.4672 [pdf, other]
Title: Analysis of Phishing Attacks and Countermeasures
B. Issac, R. Chiong, S.M. Jacob
Comments: 8 pages
Journal-ref: Issac, B., Chiong, R. & Jacob, S. M. (2006, June). Analysis of Phishing Attacks and Countermeasures. IBIMA, Bonn, Germany, ISBN 0-9753393-5-4, pp.339-346
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1410.4795 [pdf, other]
Title: Security - a perpetual war: lessons from nature
Wojciech Mazurczyk, Elżbieta Rzeszutko
Comments: 15 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:1410.4917 [pdf, other]
Title: Type-Directed Compilation for Fault-Tolerant Non-Interference
Filippo Del Tedesco, David Sands, Alejandro Russo
Comments: Extended version, 77 pages
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1410.4978 [pdf, other]
Title: Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics
Muhammad Haris, Hamed Haddadi, Pan Hui
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1410.5021 [pdf, other]
Title: Unshared Secret Key Cryptography
Shuiyin Liu, Yi Hong, Emanuele Viterbo
Comments: 13 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1410.5567 [pdf, other]
Title: Cryptographic Enforcement of Information Flow Policies without Public Information
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering
Comments: To appear in Proceedings of ACNS 2015
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1410.5696 [pdf, other]
Title: DAPriv: Decentralized architecture for preserving the privacy of medical data
Rajesh Sharma, Deepak Subramanian, Satish N. Srirama
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[42] arXiv:1410.5789 [pdf, other]
Title: Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study
Mohamed H. E. Aouadi, Khalifa Toumi, Ana Cavalli
Comments: 10 pages, 13 figures, published in IJCSI. ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 this http URL
Journal-ref: IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 5, No 2, September 2014
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[43] arXiv:1410.5904 [pdf, other]
Title: Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques
Bhavya Kailkhura, Swastik Brahma, Berkan Dulek, Yunghsiang S Han, Pramod K. Varshney
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC); Applications (stat.AP)
[44] arXiv:1410.6079 [pdf, other]
Title: Bitcoin over Tor isn't a good idea
Alex Biryukov, Ivan Pustogarov
Comments: 11 pages, 4 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:1410.6295 [pdf, other]
Title: Enhanced TKIP Michael Attacks
Martin Beck
Comments: 10 pages, 7 figures. Report was written in 2010, referenced several times in relevant literature
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1410.6582 [pdf, other]
Title: Enable Portrait Privacy Protection in Photo Capturing and Sharing
Lan Zhang, Kebin Liu, Xiang-Yang Li, Puchun Feng, Cihang Liu, Yunhao Liu
Comments: 9 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1410.6589 [pdf, other]
Title: Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection
Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu
Comments: 10 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1410.6593 [pdf, other]
Title: Cloud-based Privacy Preserving Image Storage, Sharing and Search
Lan Zhang, Taeho Jung, Puchun Feng, Xiang-Yang Li, Yunhao Liu
Comments: 15 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1410.6629 [pdf, other]
Title: That Ain't You: Detecting Spearphishing Emails Before They Are Sent
Gianluca Stringhini, Olivier Thonnard
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1410.6674 [pdf, other]
Title: Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014
Larry Koved, Kapil Singh, Hao Chen, Mike Just
Comments: 10 papers in the proceedings (of 11 presented at the MoST 2014 workshop)
Subjects: Cryptography and Security (cs.CR)
Total of 85 entries : 1-25 26-50 51-75 76-85
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack