Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2017

Total of 122 entries : 1-100 101-122
Showing up to 100 entries per page: fewer | more | all
[1] arXiv:1706.00138 [pdf, other]
Title: Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs
Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay
Comments: 4, 28th Annual Workshop of the Psychology of Programming Interest Group (PPIG), Delft, Netherlands, 2017
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[2] arXiv:1706.00206 [pdf, other]
Title: Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert
Comments: 10 pages excl. bibliography
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[3] arXiv:1706.00302 [pdf, other]
Title: When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security
Sadegh Farhang, Jens Grossklags
Comments: Workshop on the Economics of Information Security (WEIS 2017)
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1706.00324 [pdf, other]
Title: Order-Preserving Encryption Using Approximate Integer Common Divisors
James Dyer, Martin Dyer, Jie Xu
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1706.00887 [pdf, other]
Title: Wikipedia Vandal Early Detection: from User Behavior to User Embedding
Shuhan Yuan, Panpan Zheng, Xintao Wu, Yang Xiang
Comments: 14 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computers and Society (cs.CY)
[6] arXiv:1706.00891 [pdf, other]
Title: Spectrum-based deep neural networks for fraud detection
Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[7] arXiv:1706.00916 [pdf, other]
Title: A Survey on Security and Privacy Issues of Bitcoin
Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1706.00947 [pdf, other]
Title: Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version)
Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[9] arXiv:1706.01140 [pdf, other]
Title: xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs
Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1706.01324 [pdf, other]
Title: A Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism
Ruihui Zhao, Mingjie Ding, Keiichi Koyanagi, Yuanliang Sun, Liang Zhou
Comments: 7 pages, accepted by LISS 2017
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1706.01552 [pdf, other]
Title: $\mathcal{E}\text{psolute}$: Efficiently Querying Databases While Providing Differential Privacy
Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill
Comments: Camera-ready version for ACM CCS 2021
Journal-ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21)
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1706.01628 [pdf, other]
Title: Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
Subhash Lakshminarayana, Teo Zhan Teng, David K.Y. Yau, Rui Tan
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[13] arXiv:1706.01679 [pdf, other]
Title: On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control
Mikel Iturbe, José Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria
Comments: 6 pages, 5 figures. Presented in the 3rd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2016) and published in the Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2016), 2016, pp. 155-160
Journal-ref: Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2016), 2016, pp. 155-160
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1706.01730 [pdf, other]
Title: Blockchain based trust & authentication for decentralized sensor networks
Axel Moinet, Benoît Darties, Jean-Luc Baril
Comments: 6 pages, double-column. Preprint version submitted to IEEE Security & Privacy, Special Issue on Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[15] arXiv:1706.01739 [pdf, other]
Title: Multi Sensor-based Implicit User Identification
Muhammad Ahmad, Ali Kashif Bashir, Adil Mehmood Khan, Manuel Mazzara, Salvatore Distefano, Shahzad Sarfraz
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16] arXiv:1706.01742 [pdf, other]
Title: Types for Location and Data Security in Cloud Environments
Ivan Gazeau, Tom Chothia, Dominic Duggan
Comments: Short version to appear in Computer Security Foundations Symposium (CSF'17), August 2017
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1706.01756 [pdf, other]
Title: Sharing Data Homomorphically Encrypted with Different Encryption Keys
Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec, Michel Cozic
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1706.01763 [pdf, other]
Title: Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation
Andrew Norton, Yanjun Qi
Comments: 8 pages; 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[19] arXiv:1706.01939 [pdf, other]
Title: Empirical Analysis of Password Reuse and Modification across Online Service
Chun Wang, Steve T.K. Jan, Hang Hu, Gang Wang
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1706.02387 [pdf, other]
Title: Detection of App Collusion Potential Using Logic Programming
Jorge Blasco, Thomas M. Chen, Igor Muttik, Markus Roggenbach
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1706.02473 [pdf, other]
Title: Securing Databases from Probabilistic Inference
Marco Guarnieri, Srdjan Marinovic, David Basin
Comments: A short version of this paper has been accepted at the 30th IEEE Computer Security Foundations Symposium (CSF 2017)
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[22] arXiv:1706.02610 [pdf, other]
Title: CERT strategy to deal with phishing attacks
Shahrzad Sedaghat
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1706.02646 [pdf, other]
Title: An effective and secure user authenticated protocol for Location based services in road networks
Imran Memon, Hina Memon
Comments: 8 pages,6 figures
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1706.02693 [pdf, other]
Title: A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization
Jeffrey Pawlick, Quanyan Zhu
Comments: IEEE Global SIP Symposium on Control & Information Theoretic Approaches to Privacy and Security
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1706.03006 [pdf, other]
Title: Securing Application with Software Partitioning: A case study using SGX
Ahmad Atamli-Reineh, Andrew Martin
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1706.03016 [pdf, other]
Title: Privacy-Preserving Electronic Ticket Scheme with Attribute-based Credentials
Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Steve Wesemeyer
Comments: 18pages, 6 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1706.03171 [pdf, other]
Title: Attribute Based Administration of Role Based Access Control : A Detailed Description
Jiwan Ninglekhu, Ram Krishnan
Comments: 32 Pages, 1 Figure A subset of this article submitting to IEEE CIC 2017
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1706.03206 [pdf, other]
Title: Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway
Veronica del Carmen Estrada
Comments: Master Thesis, January 14th 2011, Graduate School of Interdisciplinary Information Studies, University of Tokyo
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1706.03370 [pdf, other]
Title: Decentralized Certificate Authorities
Bargav Jayaraman, Hannah Li, David Evans
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:1706.03536 [pdf, other]
Title: Towards a Uniform Framework for Dynamic Analysis of Access Control Models
Peter Amthor
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1706.03744 [pdf, other]
Title: Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems
J.S. Hammudoglu, J. Sparreboom, J.I. Rauhamaa, J.K. Faber, L.C. Guerchi, I.P. Samiotis, S.P. Rao, J.A. Pouwelse
Comments: Delft University of Technology student project report
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[32] arXiv:1706.03754 [pdf, other]
Title: LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi
Comments: Authors' pre-print version to appear in DAC 2017 proceedings
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1706.03827 [pdf, other]
Title: Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
Journal-ref: Proc. ACM Conf. on Computer and Communications Security (CCS) 2017
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1706.03852 [pdf, other]
Title: Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations
Syed Kamran Haider, Omer Khan, Marten van Dijk
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1706.03878 [pdf, other]
Title: Evaluation of Lightweight Block Ciphers in Hardware Implementation: A Comprehensive Survey
Jaber Hosseinzadeh, Abbas Ghaemi Bafghi
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1706.03885 [pdf, other]
Title: On the Secure Energy Efficiency of TAS/MRC with Relaying and Jamming Strategies (Extended Version)
Jamil Farhat, Glauber Brante, Richard Demo Souza
Comments: 10 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:1706.03909 [pdf, other]
Title: Software Implementation And Evaluation Of Lightweight Symmetric Block Ciphers Of The Energy Perspectives And Memory
Jaber Hosseinzadeh, Abbas Ghaemi Bafghi
Comments: 6 pages
Journal-ref: International Journal of Engineering Education (IJEE) March-April 2017 Vole 9, No 2
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1706.04146 [pdf, other]
Title: Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach
Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1706.04479 [pdf, other]
Title: On the Hamming Auto- and Cross-correlation Functions of a Class of Frequency Hopping Sequences of Length $ p^{n} $
Minglong Qi, Shenwu Xiong, Jingling Yuan
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1706.04507 [pdf, other]
Title: A Blockchain-based Approach for Data Accountability and Provenance Tracking
Ricardo Neisse, Gary Steri, Igor Nai-Fovino
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1706.04759 [pdf, other]
Title: PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols
Alexander Senier, Martin Beck, Thorsten Strufe
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:1706.04890 [pdf, other]
Title: Distributed Differential Privacy By Sampling
Joshua Joy
Comments: arXiv admin note: substantial text overlap with arXiv:1703.07949
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:1706.05085 [pdf, other]
Title: Horcrux: A Password Manager for Paranoids
Hannah Li, David Evans
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:1706.05092 [pdf, other]
Title: Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project
Alan T. Sherman, Linda Oliva, David DeLatte, Enis Golaszewski, Michael Neary, Konstantinos Patsourakos, Dhananjay Phatak, Travis Scheponik, Geoffrey L. Herman, Julia Thompson
Comments: Appears in the proceedings of the 2017 National Cyber Summit (June 6--8, 2017, Huntsville, AL)
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:1706.05367 [pdf, other]
Title: Practical and Provably Secure Onion Routing
Megumi Ando, Anna Lysyanskaya, Eli Upfal
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1706.05592 [pdf, other]
Title: Forming Guard Sets using AS Relationships
Mohsen Imani, Armon Barton, Matthew Wright
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1706.05715 [pdf, other]
Title: CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers
Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan
Comments: Author's version of paper to appear in the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1706.05779 [pdf, other]
Title: Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1706.05913 [pdf, other]
Title: Fusing restricted information
Magnus Jändel, Pontus Svenson, Ronnie Johansson
Comments: 9 pages, author contacts: [email protected], [email protected]
Journal-ref: Proc 17th Int Conf on Information Fusion (2014)
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[50] arXiv:1706.05916 [pdf, other]
Title: Local Differential Privacy for Physical Sensor Data and Sparse Recovery
Anna C. Gilbert, Audra McMillan
Comments: appeared at CISS 2018
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[51] arXiv:1706.05960 [pdf, other]
Title: Data protection by means of fragmentation in various different distributed storage systems - a survey
Katarzyna Kapusta, Gerard Memmi
Comments: arXiv admin note: text overlap with arXiv:1512.02951
Subjects: Cryptography and Security (cs.CR)
[52] arXiv:1706.05973 [pdf, other]
Title: Software-based Microarchitectural Attacks
Daniel Gruss
Comments: PhD Thesis. Graz University of Technology. June, 2017
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:1706.06232 [pdf, other]
Title: Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication
Yansong Gao, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith C. Ranasinghe
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:1706.06261 [pdf, other]
Title: LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren
Comments: Accepted at ACM CCS 2019
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1706.06306 [pdf, other]
Title: Code-based Key Encapsulation from McEliece's Cryptosystem
Edoardo Persichetti
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:1706.06319 [pdf, other]
Title: Solving multivariate polynomial systems and an invariant from commutative algebra
Alessio Caminata, Elisa Gorla
Comments: Final version. Theorem numbering adjusted to match the published version
Journal-ref: Lecture Notes in Computer Science, 2021, 12542 LNCS, pp. 3-36
Subjects: Cryptography and Security (cs.CR); Commutative Algebra (math.AC)
[57] arXiv:1706.06381 [pdf, other]
Title: KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks
Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:1706.06457 [pdf, other]
Title: The Evaluation of Circuit Selection Methods on Tor
Mohsen Imani, Mehrdad Amirabadi, Matthew Wright
Comments: arXiv admin note: substantial text overlap with arXiv:1608.07343
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:1706.06818 [pdf, other]
Title: Security Incident Recognition and Reporting (SIRR): An Industrial Perspective
George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller
Comments: 2017 Americas Conference on Information Systems (AMCIS 2017), Boston, Massachusetts, United States
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1706.06902 [pdf, other]
Title: Geo-Encryption Protocol For Mobile Networks
Ala Al-Fuqaha, Omar Al-Ibrahim, Ammar Rayes
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:1706.06925 [pdf, other]
Title: Static Dalvik VM bytecode instrumentation
Eugene Minibaev
Subjects: Cryptography and Security (cs.CR)
[62] arXiv:1706.06932 [pdf, other]
Title: WebPol: Fine-grained Information Flow Policies for Web Browsers
Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer
Comments: ESORICS '17
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1706.07205 [pdf, other]
Title: A Survey on Workflow Satisfiability, Resiliency, and Related Problems
Daniel Ricardo dos Santos, Silvio Ranise
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[64] arXiv:1706.07257 [pdf, other]
Title: A survey of Hardware-based Control Flow Integrity (CFI)
Ruan de Clercq, Ingrid Verbauwhede
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:1706.07600 [pdf, other]
Title: A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:1706.07748 [pdf, other]
Title: Integrating self-efficacy into a gamified approach to thwart phishing attacks
Nalin Asanka Gamagedara Arachchilage, Mumtaz Abdul Hameed
Comments: 6 pages, 3 figures, 5th International Conference on Cybercrime and Computer Forensics (ICCCF), IEEE, Sofitel Gold Coast Broadbeach on 16-18 July 2017
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[67] arXiv:1706.08003 [pdf, other]
Title: OS Fingerprinting: New Techniques and a Study of Information Gain and Obfuscation
Blake Anderson, David McGrew
Comments: 10 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1706.08017 [pdf, other]
Title: Web Vulnerability Scanners: A Case Study
Emre Erturk, Angel Rajan
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:1706.08042 [pdf, other]
Title: Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud
SeyedHossein Mohtasebi, Ali Dehghantanha, Kim-Kwang Raymond Choo
Comments: 43 pages, book chapter
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:1706.08043 [pdf, other]
Title: Honeypots for employee information security awareness and education training: A conceptual EASY training model
Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha
Comments: 20pages, book chapter
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[71] arXiv:1706.08045 [pdf, other]
Title: An Android Cloud Storage Apps Forensic Taxonomy
M. Amine Chelihi, Akintunde Elutilo, Imran Ahmed, Christos Papadopoulos, Ali Dehghantanha
Journal-ref: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, PP 285-305, Chapter 15, 2017
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:1706.08048 [pdf, other]
Title: Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors
Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou
Journal-ref: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Pages 79-89,Chapter 6, 2017
Subjects: Cryptography and Security (cs.CR)
[73] arXiv:1706.08056 [pdf, other]
Title: Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies
Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod
Comments: 16 pages book chapter
Journal-ref: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Pages 63-78, Chapter 5, 2017
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:1706.08062 [pdf, other]
Title: Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies
Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod
Journal-ref: Contemp Digital Forensic Investig of Cloud and Mobile Apps, PP. 41-62, Chap4, 2017
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:1706.08065 [pdf, other]
Title: The problem with the SURF scheme
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
Comments: Warning : we found a serious problem in the security proof of the SURF scheme. We explain this problem here and give the old version of the paper afterwards
Subjects: Cryptography and Security (cs.CR)
[76] arXiv:1706.08093 [pdf, other]
Title: One random jump and one permutation: sufficient conditions to chaotic, statistically faultless, and large throughput PRNG for FPGA
Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[77] arXiv:1706.08099 [pdf, other]
Title: Lyapunov Exponent Evaluation of the CBC Mode of Operation
Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallègue, Mohsen Machhout
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:1706.08101 [pdf, other]
Title: Design and evaluation of chaotic iterations based keyed hash function
Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:1706.08507 [pdf, other]
Title: Is my attack tree correct? Extended version
Maxime Audinot, Sophie Pinchinat, Barbara Kordy
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:1706.08562 [pdf, other]
Title: Return Oriented Programming - Exploit Implementation using functions
Sunil Kumar Sathyanarayan, Dr. Makan Pourzandi, Katayoun Aliyari
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:1706.08752 [pdf, other]
Title: A Cryptographic Approach for Steganography
Jacques M. Bahi, Christophe Guyeux, Pierre-Cyrille Heam
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:1706.08773 [pdf, other]
Title: An optimization technique on pseudorandom generators based on chaotic iterations
Jacques M. Bahi, Xiaole Fang, Christophe Guyeux
Subjects: Cryptography and Security (cs.CR); Chaotic Dynamics (nlin.CD)
[83] arXiv:1706.08879 [pdf, other]
Title: Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine
Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda
Comments: arXiv admin note: text overlap with arXiv:1603.05369
Journal-ref: ContemporaryDigital Forensic Investigations of Cloud and Mobile Applications, Pages 21-40, Chapter 3, 2017
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:1706.09165 [pdf, other]
Title: Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit
Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
Subjects: Cryptography and Security (cs.CR)
[85] arXiv:1706.09303 [pdf, other]
Title: Stealthy Deception Attacks Against SCADA Systems
Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev
Subjects: Cryptography and Security (cs.CR)
[86] arXiv:1706.09479 [pdf, other]
Title: Towards Practical Differential Privacy for SQL Queries
Noah Johnson, Joseph P. Near, Dawn Song
Comments: Extended & updated from VLDB 2018 version
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[87] arXiv:1706.09641 [pdf, other]
Title: SocialStegDisc: Application of steganography in social networks to create a file system
Jedrzej Bieniasz, Krzysztof Szczypiorski
Comments: 5 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[88] arXiv:1706.09727 [pdf, other]
Title: Improvement Of Email Threats Detection By User Training
P-Y. Cousin, V. Bernard, A. Lefaillet, M. Mugaruka, C. Raibaud
Subjects: Cryptography and Security (cs.CR)
[89] arXiv:1706.09861 [pdf, other]
Title: Rational Trust Modeling
Mehrdad Nojoumian
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA); Social and Information Networks (cs.SI)
[90] arXiv:1706.10040 [pdf, other]
Title: A solution for secure use of Kibana and Elasticsearch in multi-user environment
Wataru Takase, Tomoaki Nakamura, Yoshiyuki Watase, Takashi Sasaki
Comments: International Symposium on Grids and Clouds 2017 (ISGC 2017)
Subjects: Cryptography and Security (cs.CR)
[91] arXiv:1706.10220 [pdf, other]
Title: 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
Comments: 18 pages, Cyber-security, smart devices, sensors, sensor-based threats, 26th USENIX Security Symposium
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:1706.10274 [pdf, other]
Title: A Model for Attribute Based Role-Role Assignment (ARRA)
Jiwan Ninglekhu, Ram Krishnan
Comments: 1 Table, 1 Figure This paper was published on "Secure Knowledge Management Workshop 2017, St. Pete, FL, Oct 6-7 2017" Website: this https URL
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:1706.10276 [pdf, other]
Title: DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries
Anrin Chakraborti, Chen Chen, Radu Sion
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:1706.10292 [pdf, other]
Title: Onions in the Crosshairs: When The Man really is out to get you
Aaron D. Jaggard, Paul Syverson
Comments: 16 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:1706.00269 (cross-list from cs.LO) [pdf, other]
Title: A new method of verification of security protocols
Andrew M. Mironov
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[96] arXiv:1706.00500 (cross-list from cs.IT) [pdf, other]
Title: Generic Secure Repair for Distributed Storage
Wentao Huang, Jehoshua Bruck
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[97] arXiv:1706.00611 (cross-list from quant-ph) [pdf, other]
Title: Quantum key distribution protocol with pseudorandom bases
A.S. Trushechkin, P.A. Tregubov, E.O. Kiktenko, Y.V. Kurochkin, A.K. Fedorov
Comments: 16 pages, 4 figures; comments are welcome
Journal-ref: Phys. Rev. A 97, 012311 (2018)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[98] arXiv:1706.01407 (cross-list from cs.PL) [pdf, other]
Title: Towards a Flow- and Path-Sensitive Information Flow Analysis: Technical Report
Peixuan Li, Danfeng Zhang
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[99] arXiv:1706.01442 (cross-list from cs.IT) [pdf, other]
Title: The Capacity of Private Information Retrieval from Byzantine and Colluding Databases
Karim Banawan, Sennur Ulukus
Comments: Submitted to IEEE Transactions on Information Theory, June 2017
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[100] arXiv:1706.01560 (cross-list from cs.SI) [pdf, other]
Title: Stateless Puzzles for Real Time Online Fraud Preemption
Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar, Dongwon Lee
Journal-ref: The 9th International ACM Web Science Conference, 2017
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
Total of 122 entries : 1-100 101-122
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack