Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2015

Total of 59 entries : 1-50 51-59
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:1503.00366 [pdf, other]
Title: A New Chaos-Based Cryptosystem for Secure Transmitted Images
Abir Awad
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1503.00454 [pdf, other]
Title: Flexible and Robust Privacy-Preserving Implicit Authentication
Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia
Comments: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appear
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1503.00484 [pdf, other]
Title: Simulating Auxiliary Inputs, Revisited
Maciej Skorski
Comments: Some typos present in the previous version have been corrected
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[4] arXiv:1503.00756 [pdf, other]
Title: Constructing elastic distinguishability metrics for location privacy
Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1503.00943 [pdf, other]
Title: Transform Domain Analysis of Sequences
Muhammad Asad Khan, Amir A Khan, Fauzan Mirza
Comments: This is a comprehensive report with over 20 pages
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1503.01186 [pdf, other]
Title: Automated detection and classification of cryptographic algorithms in binary programs through machine learning
Diane Duros Hosfelt
Comments: Thesis submitted in partial fulfillment of MSE CS degree at Johns Hopkins University, 25 pages
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1503.01214 [pdf, other]
Title: Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries
Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson
Comments: 17 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1503.01382 [pdf, other]
Title: Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[9] arXiv:1503.01408 [pdf, other]
Title: Hardware Fingerprinting Using HTML5
Gabi Nakibly, Gilad Shelef, Shiran Yudilevich
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1503.01588 [pdf, other]
Title: Adaptively Secure Coin-Flipping, Revisited
Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[11] arXiv:1503.01874 [pdf, other]
Title: Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting
Anupam Das, Nikita Borisov, Matthew Caesar
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1503.02261 [pdf, other]
Title: Attack Trees with Sequential Conjunction
Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua
Comments: This is an extended version of the work published at IFIP SEC 2015
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1503.02304 [pdf, other]
Title: Efficient Hardware Design and Implementation of Encrypted MIPS Processor
Kirat Pal Singh, Dilip Kumar
Comments: 1st International Conference on Innovations and Advancements in Information and Communication Technology
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[14] arXiv:1503.02732 [pdf, other]
Title: Detecting Incompleteness, Conflicting and Unreachability XACML Policies using Answer Set Programming
Carroline Dewi Puspa Kencana Ramli
Comments: arXiv admin note: text overlap with arXiv:1206.5327
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1503.03176 [pdf, other]
Title: Towards a Science of Trust
Dusko Pavlovic
Comments: 19 pages, 3 tables, HoTSoS Bootcamp 2015, Urbana-Champaign April 21-22, 2015, proceedings published by ACM; in v2 the explanation of the NP decision rule is added, and a table formatting error is fixed
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1503.03215 [pdf, other]
Title: Environment Based Secure Transfer of Data in Wireless Sensor Networks
B. Vidhya, Mary Joseph, D. Rajini Girinath, A. Malathi
Comments: 12, VOL 4,NO 1, FEBRUARY 2015
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1503.03292 [pdf, other]
Title: Improving GGH Public Key Scheme Using Low Density Lattice Codes
Reza Hooshmand
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1503.03354 [pdf, other]
Title: New Method for Public Key Distribution Based on Social Networks
Krzysztof Podlaski, Artur Hłobaż, Piotr Milczarski
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1503.03593 [pdf, other]
Title: State of the art parallel approaches for RSA public key based cryptosystem
Sapna Saxena, Bhanu Kapoor
Comments: IJCSA February 2015
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1503.03790 [pdf, other]
Title: Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[21] arXiv:1503.03821 [pdf, other]
Title: A Class of Random Sequences for Key Generation
Krishnamurthy Kirthi, Subhash Kak
Comments: 7 pages; 4 figures
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1503.04593 [pdf, other]
Title: Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory
Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1503.04624 [pdf, other]
Title: Image Watermaking With Biometric Data For Copyright Protection
Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[24] arXiv:1503.04779 [pdf, other]
Title: Cryptanalysis of some protocols using matrices over group rings
Mohammad Eftekhari (LAMFA)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1503.04796 [pdf, other]
Title: Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
Omer K. Jasim, Safia Abbas, El-Sayed M. Horbaty, Abdel-Badeeh M. Salem
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1503.05144 [pdf, other]
Title: Piecewise Function Approximation with Private Data
Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni
Comments: Draft of paper that will be soon submitted to IEEE Transaction on Information Forensic and Security
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1503.05458 [pdf, other]
Title: Deception by Design: Evidence-Based Signaling Games for Network Defense
Jeffrey Pawlick, Quanyan Zhu
Comments: To be presented at Workshop on the Economics of Information Security (WEIS) 2015, Delft University of Technology, The Netherlands
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1503.05904 [pdf, other]
Title: Games Without Frontiers: Investigating Video Games as a Covert Channel
Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1503.05992 [pdf, other]
Title: Application Security framework for Mobile App Development in Enterprise setup
Subhamoy Chakraborti, D. P. Acharjya, Sugata Sanyal
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:1503.06115 [pdf, other]
Title: Riposte: An Anonymous Messaging System Handling Millions of Users
Henry Corrigan-Gibbs, Dan Boneh, David Mazières
Comments: This is an extended and corrected version of a paper published at the IEEE Symposium on Security and Privacy 2015 ("Oakland 2015")
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1503.06154 [pdf, other]
Title: Relationship-Based Access Control for OpenMRS
Syed Zain Rizvi, Philip W.L. Fong, Jason Crampton, James Sellwood
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1503.06497 [pdf, other]
Title: On the k-Anonymization of Time-varying and Multi-layer Social Graphs
Luca Rossi, Mirco Musolesi, Andrea Torsello
Comments: In Proceedings of 9th AAAI International Conference on Weblogs and Social Media (ICWSM 2015)
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[33] arXiv:1503.06499 [pdf, other]
Title: Privacy and the City: User Identification and Location Semantics in Location-Based Social Networks
Luca Rossi, Matthew J. Williams, Christoph Stich, Mirco Musolesi
Comments: In Proceedings of 9th AAAI International Conference on Weblogs and Social Media (ICWSM 2015)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[34] arXiv:1503.06638 [pdf, other]
Title: Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-wo Wong
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1503.07000 [pdf, other]
Title: Thermal Covert Channels on Multi-core Platforms
Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun
Comments: 15 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1503.07645 [pdf, other]
Title: Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9
Khair Eddin Sabri
Comments: 10 pages in International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:1503.07768 [pdf, other]
Title: NeuCoin: the First Secure, Cost-efficient and Decentralized Cryptocurrency
Kourosh Davarpanah, Dan Kaufman, Ophelie Pubellier
Comments: 39 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1503.07919 [pdf, other]
Title: BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations
Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1503.07932 [pdf, other]
Title: SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing
Jingchao Sun, Rui Zhang, Xiaocong Jin, Yanchao Zhang
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1503.07994 [pdf, other]
Title: iPrivacy: a Distributed Approach to Privacy on the Cloud
Ernesto Damiani, Francesco Pagano, Davide Pagano
Comments: 13 pages, International Journal on Advances in Security 2011 vol.4 no 3 & 4. arXiv admin note: substantial text overlap with arXiv:1012.0759, arXiv:1109.3555
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[41] arXiv:1503.08115 [pdf, other]
Title: A Distributed Approach to Privacy on the Cloud
Francesco Pagano
Comments: PhD Thesis in Computer Science at University of Milan - Italy 2012 March 6th
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[42] arXiv:1503.08479 [pdf, other]
Title: Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam
Comments: Accepted for Publication in the IEEE Systems Journal
Subjects: Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[43] arXiv:1503.08768 [pdf, other]
Title: Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Bryan Ford
Comments: 20 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:1503.00360 (cross-list from physics.optics) [pdf, other]
Title: Optical encryption for large-sized images using random phase-free method
Tomoyoshi Shimobaba, Takashi Kakue, Yutaka Endo, Ryuji Hirayama, Daisuke Hiyama, Satoki Hasegawa, Yuki Nagahama, Marie Sano, Takashige Sugie, Tomoyoshi Ito
Subjects: Optics (physics.optics); Cryptography and Security (cs.CR)
[45] arXiv:1503.01806 (cross-list from math.NT) [pdf, other]
Title: Restricted linear congruences
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth
Comments: Journal of Number Theory, to appear
Journal-ref: Journal of Number Theory 171 (2017), 128-144
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR); Combinatorics (math.CO)
[46] arXiv:1503.02985 (cross-list from cs.SI) [pdf, other]
Title: SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection
Peng Gao, Neil Zhenqiang Gong, Sanjeev Kulkarni, Kurt Thomas, Prateek Mittal
Comments: 17 pages, 18 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[47] arXiv:1503.03107 (cross-list from math.NT) [pdf, other]
Title: A fast algorithm for finding a short generator of a principal ideal of $\mathbb{Q}(ζ_{p^s})$
Jean-Francois Biasse
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[48] arXiv:1503.03233 (cross-list from cs.NI) [pdf, other]
Title: Security challenges in mobile ad hoc networks:a survey
Ali Dorri, Seyed Reza Kamel, Esmaeil Kheirkhah
Comments: 2 Figures, 2 Tables
Journal-ref: IJCSES Vol 6 No 1 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[49] arXiv:1503.03940 (cross-list from cs.NI) [pdf, other]
Title: RAPTOR: Routing Attacks on Privacy in Tor
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[50] arXiv:1503.04058 (cross-list from physics.soc-ph) [pdf, other]
Title: Optimal redundancy against disjoint vulnerabilities in networks
Sebastian M. Krause, Michael M. Danziger, Vinko Zlatić
Comments: 15 pages
Journal-ref: Phys. Rev. X 6, 041022 (2016)
Subjects: Physics and Society (physics.soc-ph); Statistical Mechanics (cond-mat.stat-mech); Cryptography and Security (cs.CR)
Total of 59 entries : 1-50 51-59
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack