Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2015

Total of 57 entries : 1-25 26-50 51-57
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1508.00184 [pdf, other]
Title: Comparison and evaluation of digital signature schemes employed in ndn network
Ali Al Imem
Comments: International Journal of Software Engineering & Applications Volume: 7 - Volume No: 3 - issue: June 2015
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1508.00545 [pdf, other]
Title: Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
Jun Zhao, Osman Yağan, Virgil Gligor
Comments: Full version of a paper published in Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2014
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Information Theory (cs.IT); Probability (math.PR); Physics and Society (physics.soc-ph)
[3] arXiv:1508.01053 [pdf, other]
Title: A Review of Technical Problems when Conducting an Investigation in Cloud Based Environments
Manuel Jesús Rivas Sández
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[4] arXiv:1508.01324 [pdf, other]
Title: Vehicle to Vehicle Authentication
Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal
Comments: This is a version that appeared as a brief announcement in 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS, 2015)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[5] arXiv:1508.01575 [pdf, other]
Title: On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
Lei Zhang, Chuanyan Hu, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1508.01707 [pdf, other]
Title: Analysing the Security of Google's implementation of OpenID Connect
Wanpeng Li, Chris J Mitchell
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1508.01719 [pdf, other]
Title: SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Daniel Fett, Ralf Kuesters, Guido Schmitz
Comments: Parts of this work extend the web model presented in arXiv:1411.7210 and arXiv:1403.1866
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1508.01890 [pdf, other]
Title: A proposed architecture for network forensic system in large-scale networks
Tala Tafazzoli, Elham Salahi, Hossein Gharaee
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1508.02082 [pdf, other]
Title: Vulnerability Analysis of GWireless
Benjamin Lim
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1508.02448 [pdf, other]
Title: Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta
Comments: CCS 2015 paper technical report, in progress
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1508.02526 [pdf, other]
Title: Security Incident Response Criteria: A Practitioner's Perspective
George Grispos, William Bradley Glisson, Tim Storer
Comments: The 21st Americas Conference on Information Systems (AMCIS 2015), Puerto Rico, USA. this http URL. August 13-15, 2015
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[12] arXiv:1508.03096 [pdf, other]
Title: Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features
Joshua Saxe, Konstantin Berlin
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1508.03410 [pdf, other]
Title: Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services
Mohammad Karami, Youngsam Park, Damon McCoy
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1508.03629 [pdf, other]
Title: RFC 7800 - Money Over IP
Laurent Fournier
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1508.03664 [pdf, other]
Title: Rethinking the Intercept Probability of Random Linear Network Coding
Amjad Saeed Khan, Andrea Tassi, Ioannis Chatzigeorgiou
Comments: IEEE Communications Letters, to appear
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[16] arXiv:1508.03687 [pdf, other]
Title: Universal Anomaly Detection: Algorithms and Applications
Shachar Siboni, Asaf Cohen
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1508.04324 [pdf, other]
Title: On the security of modern Single Sign-On Protocols: Second-Order Vulnerabilities in OpenID Connect
Vladislav Mladenov, Christian Mainka, Jörg Schwenk
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1508.04364 [pdf, other]
Title: Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective
Gareth W. Peters, Efstathios Panayi, Ariane Chapelle
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[19] arXiv:1508.04627 [pdf, other]
Title: Towards Vulnerability Discovery Using Staged Program Analysis
Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert
Comments: A revised version to appear in the proceedings of the 13th conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), July 2016
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[20] arXiv:1508.04868 [pdf, other]
Title: From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain
Duane Wilson, Giuseppe Ateniese
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1508.05002 [pdf, other]
Title: HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots
Hrishikesh Arun Deshpande
Comments: 5 Pages with 4 figures and 1 table
Journal-ref: IJERT ISSN: 2278-0181 Vol. 4 Issue 08, August-2015 pp. 263-267
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1508.05228 [pdf, other]
Title: A Case Study on Covert Channel Establishment via Software Caches in High-Assurance Computing Systems
Wolfgang Schmidt, Michael Hanspach, Jörg Keller
Comments: 12 pages, based upon the master's thesis of Schmidt
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[23] arXiv:1508.05411 [pdf, other]
Title: On the use of homomorphic encryption to secure cloud computing, services, and routing protocols
Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-khatib
Comments: Youssef Gahi, PhD dissertation, 2013
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[24] arXiv:1508.05457 [pdf, other]
Title: Analisis Keamanan Protokol Secure Socket Layer (SSL) Terhadap Proses Sniffing di Jaringan
Heru Pranata, Leon Andretti Abdillah, Usman Ependi
Comments: 6 pages, Student Colloquium Sistem Informasi & Teknik Informatika (SC-SITI) 2015
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1508.05626 [pdf, other]
Title: You Only Live Twice or "The Years We Wasted Caring about Shoulder-Surfing"
Joseph Maguire, Karen Renaud
Comments: Proceedings of the BCS HCI 2012
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
Total of 57 entries : 1-25 26-50 51-57
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack