Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2017

Total of 122 entries : 1-25 26-50 51-75 76-100 ... 101-122
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1706.00138 [pdf, other]
Title: Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs
Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay
Comments: 4, 28th Annual Workshop of the Psychology of Programming Interest Group (PPIG), Delft, Netherlands, 2017
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[2] arXiv:1706.00206 [pdf, other]
Title: Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert
Comments: 10 pages excl. bibliography
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[3] arXiv:1706.00302 [pdf, other]
Title: When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security
Sadegh Farhang, Jens Grossklags
Comments: Workshop on the Economics of Information Security (WEIS 2017)
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1706.00324 [pdf, other]
Title: Order-Preserving Encryption Using Approximate Integer Common Divisors
James Dyer, Martin Dyer, Jie Xu
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1706.00887 [pdf, other]
Title: Wikipedia Vandal Early Detection: from User Behavior to User Embedding
Shuhan Yuan, Panpan Zheng, Xintao Wu, Yang Xiang
Comments: 14 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computers and Society (cs.CY)
[6] arXiv:1706.00891 [pdf, other]
Title: Spectrum-based deep neural networks for fraud detection
Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[7] arXiv:1706.00916 [pdf, other]
Title: A Survey on Security and Privacy Issues of Bitcoin
Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1706.00947 [pdf, other]
Title: Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version)
Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[9] arXiv:1706.01140 [pdf, other]
Title: xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs
Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1706.01324 [pdf, other]
Title: A Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism
Ruihui Zhao, Mingjie Ding, Keiichi Koyanagi, Yuanliang Sun, Liang Zhou
Comments: 7 pages, accepted by LISS 2017
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1706.01552 [pdf, other]
Title: $\mathcal{E}\text{psolute}$: Efficiently Querying Databases While Providing Differential Privacy
Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill
Comments: Camera-ready version for ACM CCS 2021
Journal-ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21)
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1706.01628 [pdf, other]
Title: Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
Subhash Lakshminarayana, Teo Zhan Teng, David K.Y. Yau, Rui Tan
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[13] arXiv:1706.01679 [pdf, other]
Title: On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control
Mikel Iturbe, José Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria
Comments: 6 pages, 5 figures. Presented in the 3rd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2016) and published in the Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2016), 2016, pp. 155-160
Journal-ref: Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2016), 2016, pp. 155-160
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1706.01730 [pdf, other]
Title: Blockchain based trust & authentication for decentralized sensor networks
Axel Moinet, Benoît Darties, Jean-Luc Baril
Comments: 6 pages, double-column. Preprint version submitted to IEEE Security & Privacy, Special Issue on Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[15] arXiv:1706.01739 [pdf, other]
Title: Multi Sensor-based Implicit User Identification
Muhammad Ahmad, Ali Kashif Bashir, Adil Mehmood Khan, Manuel Mazzara, Salvatore Distefano, Shahzad Sarfraz
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16] arXiv:1706.01742 [pdf, other]
Title: Types for Location and Data Security in Cloud Environments
Ivan Gazeau, Tom Chothia, Dominic Duggan
Comments: Short version to appear in Computer Security Foundations Symposium (CSF'17), August 2017
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1706.01756 [pdf, other]
Title: Sharing Data Homomorphically Encrypted with Different Encryption Keys
Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec, Michel Cozic
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1706.01763 [pdf, other]
Title: Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation
Andrew Norton, Yanjun Qi
Comments: 8 pages; 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[19] arXiv:1706.01939 [pdf, other]
Title: Empirical Analysis of Password Reuse and Modification across Online Service
Chun Wang, Steve T.K. Jan, Hang Hu, Gang Wang
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1706.02387 [pdf, other]
Title: Detection of App Collusion Potential Using Logic Programming
Jorge Blasco, Thomas M. Chen, Igor Muttik, Markus Roggenbach
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1706.02473 [pdf, other]
Title: Securing Databases from Probabilistic Inference
Marco Guarnieri, Srdjan Marinovic, David Basin
Comments: A short version of this paper has been accepted at the 30th IEEE Computer Security Foundations Symposium (CSF 2017)
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[22] arXiv:1706.02610 [pdf, other]
Title: CERT strategy to deal with phishing attacks
Shahrzad Sedaghat
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1706.02646 [pdf, other]
Title: An effective and secure user authenticated protocol for Location based services in road networks
Imran Memon, Hina Memon
Comments: 8 pages,6 figures
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1706.02693 [pdf, other]
Title: A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization
Jeffrey Pawlick, Quanyan Zhu
Comments: IEEE Global SIP Symposium on Control & Information Theoretic Approaches to Privacy and Security
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1706.03006 [pdf, other]
Title: Securing Application with Software Partitioning: A case study using SGX
Ahmad Atamli-Reineh, Andrew Martin
Subjects: Cryptography and Security (cs.CR)
Total of 122 entries : 1-25 26-50 51-75 76-100 ... 101-122
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack