Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2015

Total of 95 entries
Showing up to 2000 entries per page: fewer | more | all
[1] arXiv:1506.00001 [pdf, other]
Title: A Security-assured Accuracy-maximised Privacy Preserving Collaborative Filtering Recommendation Algorithm
Zhigang Lu, Hong Shen
Comments: arXiv admin note: text overlap with arXiv:1505.07897
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1506.00022 [pdf, other]
Title: Graph Watermarks
Xiaohan Zhao, Qingyun Liu, Lin Zhou, Haitao Zheng, Ben Y. Zhao
Comments: 16 pages, 14 figures, full version
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[3] arXiv:1506.00189 [pdf, other]
Title: Robust and Efficient Elimination of Cache and Timing Side Channels
Benjamin A. Braun, Suman Jana, Dan Boneh
Comments: 15 pages, 10 figures, submitted to NDSS 2016
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1506.00277 [pdf, other]
Title: A Matrix Public Key Cryptosystem
M. Andrecut
Comments: 18 pages, C code included
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1506.00326 [pdf, other]
Title: Secure Personal Content Networking over Untrusted Devices
Uichin Lee, Joshua Joy, Youngtae Noh
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[6] arXiv:1506.00794 [pdf, other]
Title: Notes on Rainbow Distinguished Point Method
Wenhao Wang
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1506.00950 [pdf, other]
Title: Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors
Gergely Vadai, Robert Mingesz, Zoltan Gingl
Journal-ref: Scientific Reports 5, 13653 (2015)
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1506.01256 [pdf, other]
Title: PDF Steganography based on Chinese Remainder Theorem
Rene Ndoundam, Stephane Gael Raymond Ekodeck
Comments: 29pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1506.01414 [pdf, other]
Title: Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service
Mark Scanlon, Jason Farina, M-Tahar Kechadi
Comments: in Computers and Security 2015
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[10] arXiv:1506.02268 [pdf, other]
Title: Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers
George Grispos, William Bradley Glisson, Tim Storer
Journal-ref: 2015. In The Cloud Security Ecosystem, edited by Ryan Ko and Kim-Kwang Raymond Choo, Syngress, Boston, Pages 347-382
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1506.02294 [pdf, other]
Title: Forgery-Resistant Touch-based Authentication on Mobile Devices
Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank
Comments: Accepted for publication by ASIACCS'16
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1506.02717 [pdf, other]
Title: An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner, Pierre-Alain Fouque
Comments: CRYPTO 2015
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[13] arXiv:1506.02954 [pdf, other]
Title: Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values
Benjamin Mood, Debayan Gupta, Kevin Butler, Joan Feigenbaum
Comments: 20 pages, shorter conference version published in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Pages 582-596, ACM New York, NY, USA
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1506.03032 [pdf, other]
Title: N-Version Obfuscation: Impeding Software Tampering Replication with Program Diversity
Hui Xu, Yangfan Zhou, Michael R. Lyu
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[15] arXiv:1506.03392 [pdf, other]
Title: Designing a Global Authentication Infrastructure
Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1506.03471 [pdf, other]
Title: Enigma: Decentralized Computation Platform with Guaranteed Privacy
Guy Zyskind, Oz Nathan, Alex Pentland
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[17] arXiv:1506.03588 [pdf, other]
Title: Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs
Liqun Chen, Qin Li, Keith M.Martin, Siaw-Lynn Ng
Comments: This paper is a preprint of a paper submitted to IET Information Security and is subject to Institution of Engineering and Technology Copyright. If accepted, the copy of record will be available at IET Digital Library
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1506.03753 [pdf, other]
Title: Application of Multi factor authentication in Internet of Things domain
Udit Gupta
Comments: 6 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1506.03830 [pdf, other]
Title: Ciberseguridad Inteligente
Juan Manuel R. Mosso
Comments: 21 pages, in Spanish
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1506.03950 [pdf, other]
Title: Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis
Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[21] arXiv:1506.04082 [pdf, other]
Title: No SQL, No Injection? Examining NoSQL Security
Aviv Ron, Alexandra Shulman-Peleg, Emanuel Bronshtein
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1506.04103 [pdf, other]
Title: Variations in Tracking in Relation to Geographic Location
Nathaniel Fruchter, Hsin Miao, Scott Stevenson, Rebecca Balebako
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[23] arXiv:1506.04104 [pdf, other]
Title: Tracking Protection in Firefox For Privacy and Performance
Georgios Kontaxis, Monica Chew
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015. Awarded Best Paper prize at workshop
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1506.04105 [pdf, other]
Title: Because we care: Privacy Dashboard on Firefox OS
Marta Piekarska, Yun Zhou, Dominik Strohmeier, Alexander Raake
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[25] arXiv:1506.04107 [pdf, other]
Title: The Case for a General and Interaction-based Third-party Cookie Policy
Istemi Ekin Akkus, Nicholas Weaver
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[26] arXiv:1506.04110 [pdf, other]
Title: Stickler: Defending Against Malicious CDNs in an Unmodified Browser
Amit Levy, Henry Corrigan-Gibbs, Dan Boneh
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1506.04111 [pdf, other]
Title: Breaking Bad: Detecting malicious domains using word segmentation
Wei Wang, Kenneth Shirley
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1506.04112 [pdf, other]
Title: Owning Your Home Network: Router Security Revisited
Marcus Niemietz, Joerg Schwenk
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29] arXiv:1506.04113 [pdf, other]
Title: Practical Solutions For Format-Preserving Encryption
Mor Weiss, Boris Rozenberg, Muhammad Barham
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:1506.04115 [pdf, other]
Title: Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication
Paul Syverson, Griffin Boyce
Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1506.04129 [pdf, other]
Title: Applying Memory Forensics to Rootkit Detection
Igor Korkin, Ivan Nesterov
Comments: 25 pages, 3 figures, 8 tables. Paper presented at the Proceedings of the 9th annual Conference on Digital Forensics, Security and Law (CDFSL), 115-141, Richmond, VA, USA. (2014, May 28-29)
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1506.04131 [pdf, other]
Title: Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations
Igor Korkin
Comments: 25 pages, 7 figures, 8 tables. Paper presented at the Proceedings of the 10th Annual Conference on Digital Forensics, Security and Law (CDFSL), 33-57, Daytona Beach, Florida, USA (2015, May 18-21)
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP); Computation (stat.CO); Other Statistics (stat.OT)
[33] arXiv:1506.04188 [pdf, other]
Title: A case study in almost-perfect security for unconditionally secure communication
Esteban Landerreche, David Fernández-Duque
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1506.04200 [pdf, other]
Title: Malicious Behavior Detection using Windows Audit Logs
Konstantin Berlin, David Slater, Joshua Saxe
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1506.04265 [pdf, other]
Title: A Study and Implementation of RSA Cryptosystem
Sinjan Chakraborty, Vineet Kumar
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1506.04303 [pdf, other]
Title: One Breaker is Enough: Hidden Topology Attacks on Power Grids
Deepjyoti Deka, Ross Baldick, Sriram Vishwanath
Comments: 5 pages, 5 figures, Accepted to the IEEE PES General Meeting 2015
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[37] arXiv:1506.04319 [pdf, other]
Title: Generating and Exploring S-Box Multivariate Quadratic Equation Systems with SageMath
A.-M. Leventi-Peetz, J.-V. Peetz
Comments: Ca. 16 pages, contains SageMath code listings; 2nd revised version [Groebner basis treatment added; code output cut]; 3rd version [URL in reference corrected]; 4th version [small corrections; DOI and journal reference added]
Journal-ref: 2017 IEEE Conference on Dependable and Secure Computing, 2017, pp. 377-383
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[38] arXiv:1506.04391 [pdf, other]
Title: CamFlow: Managed Data-sharing for Cloud Services
Thomas F. J.-M. Pasquier, Jatinder Singh, David Eyers, Jean Bacon
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[39] arXiv:1506.04429 [pdf, other]
Title: Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols
Yvo Desmedt, Stelios Erotokritou
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1506.04502 [pdf, other]
Title: Steganography and Broadcasting
Fabrice P. Tachago, Stephane G. R. Ekodeck, Rene Ndoundam
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1506.04541 [pdf, other]
Title: Optimal Data Attacks on Power Grids: Leveraging Detection & Measurement Jamming
Deepjyoti Deka, Ross Baldick, Sriram Vishwanath
Comments: 8 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[42] arXiv:1506.04549 [pdf, other]
Title: PALPAS - PAsswordLess PAssword Synchronization
Moritz Horsch, Andreas Hülsing, Johannes Buchmann
Comments: An extended abstract of this work appears in the proceedings of ARES 2015
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:1506.04650 [pdf, other]
Title: Coding Side-Information for Implementing Cubic Transformation
B. Prashanth Reddy
Comments: 12 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:1506.04832 [pdf, other]
Title: Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks
Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:1506.04931 [pdf, other]
Title: Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication
Anjan K, Srinath N K, Jibi Abraham
Comments: 15 pages, 11 figures
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1506.05017 [pdf, other]
Title: A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks
Pavlos Basaras, Leandros Maglaras, Dimitrios Katsaros, Helge Janicke
Comments: 8 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1506.05071 [pdf, other]
Title: PROP - Patronage of PHP Web Applications
C. Sireesha, G. Jyostna, P. Raghu Varan, P. R. L. Eswari
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1506.05073 [pdf, other]
Title: Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)
Dorai Ashok Shanmugavel Anbalagan
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[49] arXiv:1506.05217 [pdf, other]
Title: Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models
Mohsin Junaid, Donggang Liu, David Kung
Journal-ref: Computers & Security, Volume 59,Pages 92-117, ISSN 0167-4048, June 2016
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1506.05285 [pdf, other]
Title: Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy, Sylvain Guilley, Zakaria Najm
Comments: Journal of Cryptographic Engineering, Springer, 2015
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:1506.05944 [pdf, other]
Title: Indistinguishability and semantic security for quantum encryption scheme
Chong Xiang, Li Yang
Comments: 14 pages, no figure
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[52] arXiv:1506.05980 [pdf, other]
Title: Towards a New Paradigm for Privacy and Security in Cloud Services
Thomas Loruenser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Huebner, Thomas Gross, Thomas Langer, Mathieu des Noes, Henrich C. Poehls, Boris Rozenberg, Daniel Slamanig
Comments: To appear in 4th Cyber Security and Privacy EU Forum, CSP Forum 2015, Revised Selected Papers
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:1506.06033 [pdf, other]
Title: Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Information Retrieval (cs.IR)
[54] arXiv:1506.06332 [pdf, other]
Title: Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1506.06633 [pdf, other]
Title: A New Approximate Min-Max Theorem with Applications in Cryptography
Maciej Skorski
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[56] arXiv:1506.06791 [pdf, other]
Title: Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean Thorpe
Comments: 10 papers in the workshop proceedings (from 33 submissions: 30% acceptance rate)
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:1506.06987 [pdf, other]
Title: Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
Hans-Joachim Hof
Journal-ref: International Journal On Advances in Security, volume 6, number 1&2, pp. 78-87 ISSN 1942-2636, 2013
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[58] arXiv:1506.06990 [pdf, other]
Title: Fighting Spam by Breaking the Econonmy of Advertisment by Unsolicited Emails
Alexander Schmidtke, Hans-Joachim Hof
Journal-ref: in SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies, pp. 96-101, ISBN 978-61208-298-1, August 2013
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:1506.06996 [pdf, other]
Title: Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility
Rainer Falk, Steffen Fries, Hans-Joachim Hof
Journal-ref: International Journal On Advances in Security, Vol. 3, No. 3 & 4, ISSN 1942-2636, 2011
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1506.07055 [pdf, other]
Title: The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications
Christoph Pohl, Hans-Joachim Hof
Comments: SECURWARE 2013 : The Seventh International Conference on Emerging Security Information, Systems and Technologies
Journal-ref: SECURWARE 2013 : The Seventh International Conference on Emerging Security Information, Systems and Technologies,2013,66-71
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:1506.07167 [pdf, other]
Title: User-Centric IT Security - How to Design Usable Security Mechanisms
Hans-Joachim Hof
Comments: arXiv admin note: substantial text overlap with arXiv:1506.06987
Journal-ref: The Fifth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2012), pp. 7-12, November 2012
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:1506.07269 [pdf, other]
Title: Distribution of elliptic twins over fixed finite fields: Numerical results
David Leon Gil
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1506.07367 [pdf, other]
Title: Open-TEE - An Open Virtual Trusted Execution Environment
Brian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan
Comments: Author's version of article to appear in 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, Helsinki, Finland, August 20-22, 2015
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:1506.07739 [pdf, other]
Title: On Making Emerging Trusted Execution Environments Accessible to Developers
Thomas Nyman, Brian McGillion, N. Asokan
Comments: Author's version of article to appear in 8th Internation Conference of Trust & Trustworthy Computing, TRUST 2015, Heraklion, Crete, Greece, August 24-26, 2015
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:1506.08503 [pdf, other]
Title: Parallel Vectorized Algebraic AES in MATLAB for Rapid Prototyping of Encrypted Sensor Processing Algorithms and Database Analytics
Jeremy Kepner, Vijay Gadepally, Braden Hancock, Peter Michaleas, Elizabeth Michel, Mayank Varia
Comments: 6 pages; accepted to IEEE High Performance Extreme Computing Conference (HPEC) 2015
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[66] arXiv:1506.08546 [pdf, other]
Title: Buffer overflow vulnerabilities in CUDA: a preliminary analysis
Andrea Miele
Comments: 12 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:1506.08548 [pdf, other]
Title: On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures)
Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Chuanyan Hu
Comments: 4 pages
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1506.08953 [pdf, other]
Title: On the Efficacy of Live DDoS Detection with Hadoop
Sufian Hameed, Usman Ali
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[69] arXiv:1506.09074 [pdf, other]
Title: Privacy-preserving Publication of Mobility Data with High Utility
Vincent Primault, Sonia Ben Mokhtar, Lionel Brunie
Comments: 2015 35th IEEE International Conference on Distributed Computed Systems
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:1506.00242 (cross-list from cs.DS) [pdf, other]
Title: Privacy for the Protected (Only)
Michael Kearns, Aaron Roth, Zhiwei Steven Wu, Grigory Yaroslavtsev
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[71] arXiv:1506.00243 (cross-list from cs.MM) [pdf, other]
Title: OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework
Hui Wang, Anthony TS Ho, Shujun Li
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Performance (cs.PF)
[72] arXiv:1506.00506 (cross-list from cs.SI) [pdf, other]
Title: Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms
Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, M. Zubair Shafiq
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[73] arXiv:1506.00522 (cross-list from math.NT) [pdf, other]
Title: Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
Dimitar Jetchev, Benjamin Wesolowski
Comments: 18 pages
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[74] arXiv:1506.00720 (cross-list from quant-ph) [pdf, other]
Title: 68 Gbps quantum random number generation by measuring laser phase fluctuations
You-Qi Nie, Leilei Huang, Yang Liu, Frank Payne, Jun Zhang, Jian-Wei Pan
Comments: 14 pages, 5 figures. Accepted for publication in Review of Scientific Instruments
Journal-ref: Rev. Sci. Instrum. 86, 063105 (2015)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[75] arXiv:1506.00930 (cross-list from cs.HC) [pdf, other]
Title: Assessing Inconspicuous Smartphone Authentication for Blind People
Diogo Marques, Luís Carriço, Tiago Guerreiro
Comments: 4 pages, 1 figure
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[76] arXiv:1506.01449 (cross-list from cs.OS) [pdf, other]
Title: Defending against malicious peripherals with Cinch
Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish
Comments: 18 pages, 7 figures
Journal-ref: Proc. USENIX Security (2016), 397--414
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[77] arXiv:1506.01739 (cross-list from cs.DC) [pdf, other]
Title: CloRoFor: Cloud Robust Forensics
Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi
Comments: 12 pages, 6 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[78] arXiv:1506.01966 (cross-list from cs.IT) [pdf, other]
Title: Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel
Marco Baldi, Giacomo Ricciutelli, Nicola Maturo, Franco Chiaraluce
Comments: 6 pages, 3 figures, IEEE ICC 2015 - Workshop on Wireless Physical Layer Security
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[79] arXiv:1506.02071 (cross-list from cs.MM) [pdf, other]
Title: Using Facebook for Image Steganography
Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj
Comments: 6 pages, 4 figures, 2 tables. Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 2015
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[80] arXiv:1506.02311 (cross-list from cs.MM) [pdf, other]
Title: StegBlocks: ensuring perfect undetectability of network steganography
Wojciech Fraczek, Krzysztof Szczypiorski
Comments: 6 pages, 1 figure, Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 2015
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[81] arXiv:1506.02354 (cross-list from cs.IT) [pdf, other]
Title: Secure Ad-hoc Routing Scheme
Anish Prasad Shrestha, Kyung Sup Kwak
Comments: There are some errors that needs to be fixed
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[82] arXiv:1506.02711 (cross-list from math.CO) [pdf, other]
Title: Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families
Maura B. Paterson, Douglas R. Stinson
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR)
[83] arXiv:1506.02742 (cross-list from math.CO) [pdf, other]
Title: Polynomial Expressions of Carries in p-ary Arithmetics
Shizuo Kaji, Toshiaki Maeno, Koji Nuida, Yasuhide Numata
Comments: (v2) Improved results and new observations (v3) The authors are notified that our main theorem (Theorem 2) appears (by a different approach) in [C. Sturtivant, G. S. Frandsen: Theoretical Computer Science 112 (1993) 291-309]. The authors would like to keep this preprint online for reference purposes
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR); Information Theory (cs.IT); Number Theory (math.NT)
[84] arXiv:1506.02820 (cross-list from cs.IT) [pdf, other]
Title: Decoding of Repeated-Root Cyclic Codes up to New Bounds on Their Minimum Distance
Alexander Zeh, Markus Ulmschneider
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Combinatorics (math.CO); Number Theory (math.NT)
[85] arXiv:1506.03681 (cross-list from cs.MM) [pdf, other]
Title: A Novel Approach for Image Steganography in Spatial Domain
Fatema Akhter
Journal-ref: Global Journal of Computer Science and Technology, Volume 13, Issue 7, pp. 1-6 Year 2013
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[86] arXiv:1506.03774 (cross-list from cs.SY) [pdf, other]
Title: Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation
Jingwen Liang, Lalitha Sankar, Oliver Kosut
Comments: 9 pages, 7 figures. A version of this manuscript was submitted to the IEEE Transactions on Power Systems
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[87] arXiv:1506.04584 (cross-list from cs.IR) [pdf, other]
Title: Re-scale AdaBoost for Attack Detection in Collaborative Filtering Recommender Systems
Zhihai Yang, Lin Xu, Zhongmin Cai
Comments: 30 pages, 8 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[88] arXiv:1506.05247 (cross-list from cs.IR) [pdf, other]
Title: Defending Grey Attacks by Exploiting Wavelet Analysis in Collaborative Filtering Recommender Systems
Zhihai Yang
Comments: 16 pages, 16 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[89] arXiv:1506.05506 (cross-list from stat.ME) [pdf, other]
Title: Noise Addition for Individual Records to Preserve Privacy and Statistical Characteristics: Case Study of Real Estate Transaction Data
Yuzo Maruyama, Ryoko Tone, Yasushi Asami
Comments: 16 pages; minor change in title; revised version
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[90] arXiv:1506.05533 (cross-list from cs.CY) [pdf, other]
Title: Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps
Ben Martini, Quang Do, Kim-Kwang Raymond Choo
Comments: Book Chapter in Cloud Security Ecosystem (Syngress, an Imprint of Elsevier), 2015
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[91] arXiv:1506.06114 (cross-list from cs.IT) [pdf, other]
Title: Secure Degrees of Freedom of One-hop Wireless Networks with No Eavesdropper CSIT
Pritam Mukherjee, Jianwei Xie, Sennur Ulukus
Comments: Submitted to IEEE Transactions on Information Theory, June 2015
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[92] arXiv:1506.06162 (cross-list from math.ST) [pdf, other]
Title: Private Graphon Estimation for Sparse Graphs
Christian Borgs, Jennifer T. Chayes, Adam Smith
Comments: 36 pages
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[93] arXiv:1506.07466 (cross-list from cs.NI) [pdf, other]
Title: Key Pre-Distributions From Graph-Based Block Designs
Jie Ding, Abdelmadjid Bouabdallah, Vahid Tarokh
Comments: This manuscript was submitted to the IEEE Sensors Journal on March 13, 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[94] arXiv:1506.08565 (cross-list from cs.IT) [pdf, other]
Title: Full-Duplex vs. Half-Duplex Secret-Key Generation
Hendrik Vogt, Zohaib Hassan Awan, Aydin Sezgin
Comments: Extended version, submitted to IEEE Transactions on Communications
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[95] arXiv:1506.08865 (cross-list from cs.CY) [pdf, other]
Title: End-to-End Privacy for Open Big Data Markets
Charith Perera, Rajiv Ranjan, Lizhe Wang
Comments: Accepted to be published in IEEE Cloud Computing Magazine: Special Issue Cloud Computing and the Law
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
Total of 95 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack