Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for April 2017

Total of 91 entries : 1-25 26-50 51-75 76-91
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1704.00073 [pdf, other]
Title: BlockChain: A distributed solution to automotive security and privacy
Ali Dorri, Marco Steger, Salil S. Kanhere, Raja Jurdak
Journal-ref: IEEE Communications Magazine, 2017
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1704.00358 [pdf, other]
Title: Middle-Square Weyl Sequence RNG
Bernard Widynski
Comments: A software package with example programs is available at this http URL
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1704.00457 [pdf, other]
Title: Secured Outsourced Content Based Image Retrieval Based on Encrypted Signatures Extracted From Homomorphically Encrypted Images
Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec, Michel Cozic
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1704.00679 [pdf, other]
Title: A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1704.00792 [pdf, other]
Title: Anomalous keys in Tor relays
George Kadianakis, Claudia V. Roberts, Laura M. Roberts, Philipp Winter
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1704.00843 [pdf, other]
Title: Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal
Comments: Appearing at IEEE S&P 2017
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[7] arXiv:1704.01046 [pdf, other]
Title: Using Echo State Networks for Cryptography
Rajkumar Ramamurthy, Christian Bauckhage, Krisztian Buza, Stefan Wrobel
Comments: 8 pages, ICANN 2017
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[8] arXiv:1704.01175 [pdf, other]
Title: Towards an IT Security Risk Assessment Framework for Railway Automation
Jens Braband
Comments: 14 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1704.01704 [pdf, other]
Title: Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks
Yi Han, Benjamin I. P. Rubinstein
Comments: 10 pages, 7 figures, 10 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[10] arXiv:1704.01759 [pdf, other]
Title: A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization
Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[11] arXiv:1704.02032 [pdf, other]
Title: Video Liveness for Citizen Journalism: Attacks and Defenses
Mahmudur Rahman, Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1704.02426 [pdf, other]
Title: Towards Attack-Tolerant Networks: Concurrent Multipath Routing and the Butterfly Network
Edward L. Platt, Daniel M. Romero
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[13] arXiv:1704.02440 [pdf, other]
Title: Audit Analysis Models, Security Frameworks and Their Relevance for VoIP
Oscar Gavilanez, Franklin Gavilanez, Glen Rodriguez
Comments: 12th International Conference on Cyber Warfare and Security - ICCWS 2017, At Dayton, USA
Journal-ref: Proceedings of the 12th International Conference on Cyber Warfare and Security - ICCWS 2017, pp.143-151
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1704.02441 [pdf, other]
Title: Ontologies for Network Security and Future Challenges
Danny Velasco, Glen Rodriguez
Comments: 12th International Conference on Cyber Warfare and Security - ICCWS 2017, At Dayton, USA
Journal-ref: Proceedings of the 12th International Conference on Cyber Warfare and Security - ICCWS 2017, pp.541-547
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1704.02553 [pdf, other]
Title: Securing Vehicle to Vehicle Communications using Blockchain through Visible Light and Acoustic Side-Channels
Sean Rowan, Michael Clear, Mario Gerla, Meriel Huggard, Ciarán Mc Goldrick
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1704.02654 [pdf, other]
Title: Enhancing Robustness of Machine Learning Systems via Data Transformations
Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17] arXiv:1704.02659 [pdf, other]
Title: Tight Bounds on Online Checkpointing Algorithms
Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir
Comments: Appeared at ICALP 2018
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1704.02683 [pdf, other]
Title: A Secure Key Agreement Protocol for Dynamic Group
Muhammad Bilal, Shin-Gak Kang
Comments: This article is accepted for the publication in Cluster Computing-The Journal of Networks, Software Tools and Applications. Print ISSN 1386-7857, Online ISSN 1573-7543
Journal-ref: Cluster Computing, Volume 20, Issue 3, September 2017, Pages 2779-2792
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[19] arXiv:1704.02768 [pdf, other]
Title: Prover efficient public verification of dense or sparse/structured matrix-vector multiplication
Jean-Guillaume Dumas (CASYS), Vincent Zucca (PEQUAN)
Journal-ref: ACISP 2017, 22nd Australasian Conference on Information Security and Privacy, Jul 2017, Auckland, New Zealand. Lecture Notes in Computer Science, 2017
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[20] arXiv:1704.02786 [pdf, other]
Title: Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi
Comments: 17+3 pages
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1704.02803 [pdf, other]
Title: Making Defeating CAPTCHAs Harder for Bots
Nasser Mohammed Al-Fannah
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1704.02883 [pdf, other]
Title: Update-tolerant and Revocable Password Backup (Extended Version)
Moritz Horsch, Johannes Braun, Dominique Metz, Johannes Buchmann
Comments: Extended version of the paper appeared in the proceedings of the ACISP 2017
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1704.02972 [pdf, other]
Title: Using Aesthetic Judgements to Distinguish between Humans and Computers
Nasser Mohammed Al-Fannah
Comments: There are errors in the user trial described in 10.1.1 of the paper. Due to several reasons including that one of the described CAPTCHAs no longer exists, the author is unable to repeat the trial. However, it is important to note that the aforementioned trial only represents a small part of the results reported in the study. To the author's knowledge, the rest of the study is valid and sound
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1704.03049 [pdf, other]
Title: Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress)
Ashish Kundu, Chinmay Kundu, Karan K. Budhraja
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1704.03118 [pdf, other]
Title: PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao
Comments: To appear in ICDCS'17
Subjects: Cryptography and Security (cs.CR)
Total of 91 entries : 1-25 26-50 51-75 76-91
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack