Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2015

Total of 57 entries : 1-50 51-57
Showing up to 50 entries per page: fewer | more | all
[51] arXiv:1508.04978 (cross-list from cs.MM) [pdf, other]
Title: "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel
Comments: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, November 5-6, 2015
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[52] arXiv:1508.05052 (cross-list from math.HO) [pdf, other]
Title: Weighing Coins and Keeping Secrets
Nicholas Diaco, Tanya Khovanova
Comments: 14 pages
Subjects: History and Overview (math.HO); Cryptography and Security (cs.CR)
[53] arXiv:1508.06574 (cross-list from stat.ML) [pdf, other]
Title: A review of homomorphic encryption and software tools for encrypted statistical machine learning
Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes
Comments: 21 pages, technical report
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54] arXiv:1508.06829 (cross-list from cs.DS) [pdf, other]
Title: Tight Lower Bounds for the Workflow Satisfiability Problem Based on the Strong Exponential Time Hypothesis
Gregory Gutin, Magnus Wahlstrom
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[55] arXiv:1508.06845 (cross-list from stat.ML) [pdf, other]
Title: Encrypted statistical machine learning: new privacy preserving methods
Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes
Comments: 39 pages
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[56] arXiv:1508.07246 (cross-list from cs.SY) [pdf, other]
Title: Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs
Ahmad F. Taha, Junjian Qi, Jianhui Wang, Jitesh H. Panchal
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[57] arXiv:1508.07306 (cross-list from cs.DB) [pdf, other]
Title: On the Privacy Properties of Variants on the Sparse Vector Technique
Yan Chen, Ashwin Machanavajjhala
Comments: 8 pages
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
Total of 57 entries : 1-50 51-57
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack