Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for December 2015

Total of 87 entries : 1-25 26-50 51-75 76-87
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1512.00054 [pdf, other]
Title: Incident Response Plan for a Small to Medium Sized Hospital
Charles DeVoe, Shawon Rahman
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[2] arXiv:1512.00067 [pdf, other]
Title: Non-profit Organizations' Need to Address Security for Effective Government Contacting
Lee Rice, Shawon Rahman
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:1512.00070 [pdf, other]
Title: Video Surveillance in the Cloud?
DJ Neal, Shawon Rahman
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[4] arXiv:1512.00071 [pdf, other]
Title: Survey of robust and resilient social media tools on Android
P.W.G. Brussee, J.A. Pouwelse
Comments: 11 pages, 9 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[5] arXiv:1512.00082 [pdf, other]
Title: Exploring Historical and Emerging Phishing Techniques and Mitigating the Associated Security Risks
Marc Rader, Shawon Rahman
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[6] arXiv:1512.00085 [pdf, other]
Title: Complete Network Security Protection for SME's within Limited Resources
Margie Todd, Shawon Rahman
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[7] arXiv:1512.00102 [pdf, other]
Title: Secure Distributed Membership Tests via Secret Sharing: How to Hide Your Hostile Hosts Harnessing Shamir Secret Sharing
David Zage, Helen Xu, Thomas Kroeger, Bridger Hahn, Nolan Donoghue, Thomas Benson
Comments: 6 pages and 3 figures. Submitted and accepted at CNC at ICNC 2016
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1512.00201 [pdf, other]
Title: Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification
Saffija Kasem-Madani, Michael Meier
Comments: 13 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1512.00274 [pdf, other]
Title: On Constructing Secure and Hardware-Efficient Invertible Mappings
Elena Dubrova
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1512.00327 [pdf, other]
Title: Technical Privacy Metrics: a Systematic Survey
Isabel Wagner, David Eckhoff
Journal-ref: Isabel Wagner and David Eckhoff. 2018. Technical Privacy Metrics: a Systematic Survey. ACM Comput. Surv. 51, 3, Article 57 (June 2018)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Performance (cs.PF)
[11] arXiv:1512.00351 [pdf, other]
Title: Authentication Based Solutions to Counterfeiting of Manufactured Goods
Joseph Kilcullen
Comments: No changes. I have merged this paper's contents into another paper i.e. https://arxiv.boxedpaper.com/abs/1511.03894
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1512.00360 [pdf, other]
Title: War of 2050: a Battle for Information, Communications, and Computer Security
Alexander Kott, David S. Alberts, Cliff Wang
Comments: A shorter version of this paper has been accepted for publication in IEEE Computer, December 2015
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1512.00407 [pdf, other]
Title: Science of Cyber Security as a System of Models and Problems
Alexander Kott
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1512.00524 [pdf, other]
Title: Toward an Efficient Website Fingerprinting Defense
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
Comments: To appear In the proceedings of the European Symposium on Research in Computer Security (ESORICS), pp. 20, Springer, 2016
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1512.01479 [pdf, other]
Title: Strong and Provably Secure Database Access Control
Marco Guarnieri, Srdjan Marinovic, David Basin
Comments: A short version of this paper has been published in the proceedings of the 1st IEEE European Symposium on Security and Privacy (EuroS&P 2016)
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[16] arXiv:1512.01581 [pdf, other]
Title: Threshold Voltage-Defined Switches for Programmable Gates
Anirudh Iyengar, Swaroop Ghosh
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[17] arXiv:1512.01630 [pdf, other]
Title: Modelling and Analysis of Network Security - an Algebraic Approach
Qian Zhang, Ying Jiang, Peng Wu
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1512.01730 [pdf, other]
Title: Security Risks in Mechanical Engineering Industries
Karen Benson, Shawon Rahman
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[19] arXiv:1512.01731 [pdf, other]
Title: Healthcare IT: Is your Information at Risk?
Kimmarie Donahue, Shawon Rahman
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[20] arXiv:1512.01980 [pdf, other]
Title: Ransomware: A Rising Threat of new age Digital Extortion
Akashdeep Bhardwaj, G.V.B. Subrahmanyam, Vinay Avasthi, Hanumat Sastry
Comments: This paper has been withdrawn by the author due to a crucial sign error in the findings and paper
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[21] arXiv:1512.02006 [pdf, other]
Title: Security Algorithms for Cloud Computing Environment
Akashdeep Bhardwaj, GVB Subrahmanyam, Vinay Avasthi, Hanumat Sastry
Comments: This paper has been withdrawn by the author due to a crucial sign error in the findings and paper
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1512.02196 [pdf, other]
Title: Securing Cloud - The Quantum Way
Marmik Pandya
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1512.02756 [pdf, other]
Title: Robustness enhancement of cloud computing network based on coupled networks model
Zibin Su, Jing Yuan
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1512.02888 [pdf, other]
Title: Enforcing transparent access to private content in social networks by means of automatic sanitization
Alexandre Viejo, David Sánchez
Comments: The content of this version is compliant with arXiv's license agreement
Journal-ref: Expert Systems with Applications 62:148-160 (2016)
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[25] arXiv:1512.02897 [pdf, other]
Title: Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation
David Sánchez, Josep Domingo-Ferrer, Sergio Martínez, Jordi Soria-Comas
Journal-ref: Information Fusion 30:1-14 (2016)
Subjects: Cryptography and Security (cs.CR)
Total of 87 entries : 1-25 26-50 51-75 76-87
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack