Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2017

Total of 122 entries : 1-25 26-50 51-75 76-100 101-122
Showing up to 25 entries per page: fewer | more | all
[76] arXiv:1706.08093 [pdf, other]
Title: One random jump and one permutation: sufficient conditions to chaotic, statistically faultless, and large throughput PRNG for FPGA
Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[77] arXiv:1706.08099 [pdf, other]
Title: Lyapunov Exponent Evaluation of the CBC Mode of Operation
Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallègue, Mohsen Machhout
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:1706.08101 [pdf, other]
Title: Design and evaluation of chaotic iterations based keyed hash function
Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:1706.08507 [pdf, other]
Title: Is my attack tree correct? Extended version
Maxime Audinot, Sophie Pinchinat, Barbara Kordy
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:1706.08562 [pdf, other]
Title: Return Oriented Programming - Exploit Implementation using functions
Sunil Kumar Sathyanarayan, Dr. Makan Pourzandi, Katayoun Aliyari
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:1706.08752 [pdf, other]
Title: A Cryptographic Approach for Steganography
Jacques M. Bahi, Christophe Guyeux, Pierre-Cyrille Heam
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:1706.08773 [pdf, other]
Title: An optimization technique on pseudorandom generators based on chaotic iterations
Jacques M. Bahi, Xiaole Fang, Christophe Guyeux
Subjects: Cryptography and Security (cs.CR); Chaotic Dynamics (nlin.CD)
[83] arXiv:1706.08879 [pdf, other]
Title: Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine
Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda
Comments: arXiv admin note: text overlap with arXiv:1603.05369
Journal-ref: ContemporaryDigital Forensic Investigations of Cloud and Mobile Applications, Pages 21-40, Chapter 3, 2017
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:1706.09165 [pdf, other]
Title: Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit
Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
Subjects: Cryptography and Security (cs.CR)
[85] arXiv:1706.09303 [pdf, other]
Title: Stealthy Deception Attacks Against SCADA Systems
Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev
Subjects: Cryptography and Security (cs.CR)
[86] arXiv:1706.09479 [pdf, other]
Title: Towards Practical Differential Privacy for SQL Queries
Noah Johnson, Joseph P. Near, Dawn Song
Comments: Extended & updated from VLDB 2018 version
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[87] arXiv:1706.09641 [pdf, other]
Title: SocialStegDisc: Application of steganography in social networks to create a file system
Jedrzej Bieniasz, Krzysztof Szczypiorski
Comments: 5 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[88] arXiv:1706.09727 [pdf, other]
Title: Improvement Of Email Threats Detection By User Training
P-Y. Cousin, V. Bernard, A. Lefaillet, M. Mugaruka, C. Raibaud
Subjects: Cryptography and Security (cs.CR)
[89] arXiv:1706.09861 [pdf, other]
Title: Rational Trust Modeling
Mehrdad Nojoumian
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA); Social and Information Networks (cs.SI)
[90] arXiv:1706.10040 [pdf, other]
Title: A solution for secure use of Kibana and Elasticsearch in multi-user environment
Wataru Takase, Tomoaki Nakamura, Yoshiyuki Watase, Takashi Sasaki
Comments: International Symposium on Grids and Clouds 2017 (ISGC 2017)
Subjects: Cryptography and Security (cs.CR)
[91] arXiv:1706.10220 [pdf, other]
Title: 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
Comments: 18 pages, Cyber-security, smart devices, sensors, sensor-based threats, 26th USENIX Security Symposium
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:1706.10274 [pdf, other]
Title: A Model for Attribute Based Role-Role Assignment (ARRA)
Jiwan Ninglekhu, Ram Krishnan
Comments: 1 Table, 1 Figure This paper was published on "Secure Knowledge Management Workshop 2017, St. Pete, FL, Oct 6-7 2017" Website: this https URL
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:1706.10276 [pdf, other]
Title: DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries
Anrin Chakraborti, Chen Chen, Radu Sion
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:1706.10292 [pdf, other]
Title: Onions in the Crosshairs: When The Man really is out to get you
Aaron D. Jaggard, Paul Syverson
Comments: 16 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:1706.00269 (cross-list from cs.LO) [pdf, other]
Title: A new method of verification of security protocols
Andrew M. Mironov
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[96] arXiv:1706.00500 (cross-list from cs.IT) [pdf, other]
Title: Generic Secure Repair for Distributed Storage
Wentao Huang, Jehoshua Bruck
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[97] arXiv:1706.00611 (cross-list from quant-ph) [pdf, other]
Title: Quantum key distribution protocol with pseudorandom bases
A.S. Trushechkin, P.A. Tregubov, E.O. Kiktenko, Y.V. Kurochkin, A.K. Fedorov
Comments: 16 pages, 4 figures; comments are welcome
Journal-ref: Phys. Rev. A 97, 012311 (2018)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[98] arXiv:1706.01407 (cross-list from cs.PL) [pdf, other]
Title: Towards a Flow- and Path-Sensitive Information Flow Analysis: Technical Report
Peixuan Li, Danfeng Zhang
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[99] arXiv:1706.01442 (cross-list from cs.IT) [pdf, other]
Title: The Capacity of Private Information Retrieval from Byzantine and Colluding Databases
Karim Banawan, Sennur Ulukus
Comments: Submitted to IEEE Transactions on Information Theory, June 2017
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[100] arXiv:1706.01560 (cross-list from cs.SI) [pdf, other]
Title: Stateless Puzzles for Real Time Online Fraud Preemption
Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar, Dongwon Lee
Journal-ref: The 9th International ACM Web Science Conference, 2017
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
Total of 122 entries : 1-25 26-50 51-75 76-100 101-122
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack