Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for February 2017

Total of 94 entries : 1-25 26-50 51-75 76-94
Showing up to 25 entries per page: fewer | more | all
[51] arXiv:1702.07456 [pdf, other]
Title: Efficient Hidden Vector Encryptions and Its Applications
Kwangsu Lee
Comments: PhD Thesis, Korea University, February 2011
Subjects: Cryptography and Security (cs.CR)
[52] arXiv:1702.07464 [pdf, other]
Title: Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz
Comments: ACM CCS'17, 16 pages, 18 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[53] arXiv:1702.07476 [pdf, other]
Title: Renyi Differential Privacy
Ilya Mironov
Journal-ref: Proceedings of IEEE 30th Computer Security Foundations Symposium CSF 2017, pages 263-275, IEEE, Aug 2017
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:1702.07502 [pdf, other]
Title: Yet Another Pseudorandom Number Generator
Borislav Stoyanov, Krzysztof Szczypiorski, Krasimir Kordov
Comments: 5 pages, 7 figures; to be published in International Journal of Electronics and Telecommunications, vol.63, no.4
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1702.07521 [pdf, other]
Title: Software Grand Exposure: SGX Cache Attacks Are Practical
Ferdinand Brasser (1), Urs Müller (2), Alexandra Dmitrienko (2), Kari Kostiainen (2), Srdjan Capkun (2), Ahmad-Reza Sadeghi (1) ((1) System Security Lab, Technische Universität Darmstadt, Germany, (2) Institute of Information Security, ETH Zurich, Switzerland)
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:1702.07588 [pdf, other]
Title: Practical Homomorphic Encryption Over the Integers
James Dyer, Martin Dyer, Jie Xu
Subjects: Cryptography and Security (cs.CR)
[57] arXiv:1702.07707 [pdf, other]
Title: Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses
Giovanni Cherubin
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:1702.07745 [pdf, other]
Title: Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Rupinder Paul Khandpur, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan
Comments: 13 single column pages, 5 figures, submitted to KDD 2017
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Information Retrieval (cs.IR); Social and Information Networks (cs.SI)
[59] arXiv:1702.08006 [pdf, other]
Title: CRSTIP - An Assessment Scheme for Security Assessment Processes
Arthur-Jozsef Molnar, Jürgen Großmann
Comments: IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2014
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1702.08208 [pdf, other]
Title: Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA
Jakub Breier, Wei He
Comments: 12 pages, 4 figures
Journal-ref: Proceedings of the 2015 International Workshop on Secure Internet of Things (SIoT), pp. 58-64
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:1702.08234 [pdf, other]
Title: "If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps
Hamza Harkous, Karl Aberer
Comments: Authors' extended version of the paper published at CODASPY 2017
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[62] arXiv:1702.08301 [pdf, other]
Title: Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures
Julien Bringer, Herve Chabanne, Daniel Le Metayer, Roch Lescuyer
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[63] arXiv:1702.08342 [pdf, other]
Title: Curie: Policy-based Secure Data Exchange
Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel
Comments: updated (this version has been accepted to CODASPY 2019)
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[64] arXiv:1702.08568 [pdf, other]
Title: eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
Joshua Saxe, Konstantin Berlin
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[65] arXiv:1702.08719 [pdf, other]
Title: Malware Guard Extension: Using SGX to Conceal Cache Attacks
Michael Schwarz (1), Samuel Weiser (1), Daniel Gruss (1), Clémentine Maurice (1), Stefan Mangard (1) ((1) Graz University of Technology)
Comments: Extended version of DIMVA 2017 submission
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:1702.00164 (cross-list from cs.SI) [pdf, other]
Title: Mining Anonymity: Identifying Sensitive Accounts on Twitter
Sai Teja Peddinti, Keith W. Ross, Justin Cappos
Comments: A shorter 4-page version of this work has been published as a poster in the International AAAI Conference on Web and Social Media (ICWSM), 2016
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[67] arXiv:1702.00535 (cross-list from cs.DB) [pdf, other]
Title: Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage
Xi He, Ashwin Machanavajjhala, Cheryl Flynn, Divesh Srivastava
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[68] arXiv:1702.00942 (cross-list from quant-ph) [pdf, other]
Title: Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing
Ryutaroh Matsumoto
Comments: this http URL, 3 pages, no figure
Journal-ref: IEICE Trans. Fundamentals, vol. E100-A, no. 2, pp. 726-728 (Feb. 2017)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[69] arXiv:1702.01032 (cross-list from cs.IR) [pdf, other]
Title: Semi-Supervised Spam Detection in Twitter Stream
Surendra Sedhai, Aixin Sun
Comments: 9
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[70] arXiv:1702.01739 (cross-list from cs.IT) [pdf, other]
Title: Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes
Karim Banawan, Sennur Ulukus
Comments: Submitted to IEEE Transactions on Information Theory, February 2017
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[71] arXiv:1702.02284 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Neural Network Policies
Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, Pieter Abbeel
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[72] arXiv:1702.02798 (cross-list from cs.CY) [pdf, other]
Title: Survey on Remote Electronic Voting
Alexander Schneider, Christian Meter, Philipp Hagemeister
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[73] arXiv:1702.02970 (cross-list from cs.DS) [pdf, other]
Title: The Price of Selection in Differential Privacy
Mitali Bafna, Jonathan Ullman
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[74] arXiv:1702.03068 (cross-list from cs.DC) [pdf, other]
Title: DBFT: Efficient Byzantine Consensus with a Weak Coordinator and its Application to Consortium Blockchains
Tyler Crain, Vincent Gramoli, Mikel Larrea, Michel Raynal
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[75] arXiv:1702.03504 (cross-list from cs.LO) [pdf, other]
Title: Time, Computational Complexity, and Probability in the Analysis of Distance-Bounding Protocols
Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott
Comments: Extending our POST 2015 paper
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
Total of 94 entries : 1-25 26-50 51-75 76-94
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack