Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2017

Total of 161 entries : 1-25 26-50 51-75 76-100 ... 151-161
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1708.00157 [pdf, other]
Title: A Stable Coin with Pro-rated Rebasement and Price Manipulation Protection
Jose I. Orlicki
Comments: 9 pages, 4 figures, draft
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1708.00319 [pdf, other]
Title: Privacy Protection Cache Policy on Hybrid Main Memory
Na-Young Ahn, Donghoon Lee
Comments: 2 pages, 3 figures, IEEE Transactions on Very Large Scale Integration Systems. arXiv admin note: text overlap with arXiv:1707.02842
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:1708.00562 [pdf, other]
Title: A Unique One-Time Password Table Sequence Pattern Authentication: Application to Bicol University Union of Federated Faculty Association, Inc. (BUUFFAI) eVoting System
Benedicto B. Balilo Jr., Bobby D. Gerardo, Ruji P. Medina, Yungcheol Byun
Comments: Vol. 1, No. 1, pp. 1-10 this https URL
Journal-ref: International Journal of Computing Sciences Research (ISSN (print): 2546-0552)2017
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1708.00807 [pdf, other]
Title: Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning
Andrew P. Norton, Yanjun Qi
Comments: 5 pages. {I.2.6}{Artificial Intelligence} ; {K.6.5}{Management of Computing and Information Systems}{Security and Protection}. arXiv admin note: substantial text overlap with arXiv:1706.01763
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[5] arXiv:1708.00930 [pdf, other]
Title: Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks
Mauro Barni, Luca Bondi, Nicolò Bonettini, Paolo Bestagini, Andrea Costanzo, Marco Maggini, Benedetta Tondi, Stefano Tubaro
Comments: Submitted to Journal of Visual Communication and Image Representation (first submission: March 20, 2017; second submission: August 2, 2017)
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[6] arXiv:1708.00969 [pdf, other]
Title: Modeling the Propagation of Trojan Malware in Online Social Networks
Mohammad Reza Faghani, Uyen Trang Nugyen
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1708.00979 [pdf, other]
Title: New Results on the DMC Capacity and Renyi's Divergence
Yi Janet Lu
Comments: Part of the material was presented at the 2nd International Workshop on Boolean Functions and their Applications (BFA), Sosltrand, Norway, July 3-8, 2017
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[8] arXiv:1708.00991 [pdf, other]
Title: Trust Implications of DDoS Protection in Online Elections
Chris Culnane, Mark Eldridge, Aleksander Essex, Vanessa Teague
Comments: Published in E-Vote-ID 2017
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1708.01023 [pdf, other]
Title: Collusion-Secure Watermarking for Sequential Data
Arif Yilmaz, Erman Ayday
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1708.01171 [pdf, other]
Title: Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
Comments: Published in ACM CCS 2017, this is the full version with all appendices
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1708.01295 [pdf, other]
Title: On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness
Nilesh Chakraborty, Shreya Singh, Samrat Mondal
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1708.01302 [pdf, other]
Title: A solution for ARP spoofing: Layer-2 MAC and protocol filtering and arpserver
Yuksel Arslan
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1708.01706 [pdf, other]
Title: Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes
Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1708.01728 [pdf, other]
Title: Privileged Data within Digital Evidence
Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1708.01730 [pdf, other]
Title: Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
Xiaoyu Du, Nhien-An Le-Khac, Mark Scanlon
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1708.01731 [pdf, other]
Title: Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification
Erik Schaefer, Nhien-An Le-Khac, Mark Scanlon
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1708.01732 [pdf, other]
Title: Private Web Browser Forensics: A Case Study of the Epic Privacy Browser
Alan Reed, Mark Scanlon, Nhien-An Le-Khac
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1708.01834 [pdf, other]
Title: Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots
Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[19] arXiv:1708.01864 [pdf, other]
Title: Exploiting Latent Attack Semantics for Intelligent Malware Detection
Mkhail Kazdagli, Constantine Caramanis, Sanjay Shakkottai, Mohit Tiwari
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1708.01868 [pdf, other]
Title: Concealing IMSI in 5G Network Using Identity Based Encryption
Mohsin Khan, Valtteri Niemi
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1708.01884 [pdf, other]
Title: Differential Privacy By Sampling
Josh Joy, Mario Gerla
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1708.02091 [pdf, other]
Title: MoPS: A Modular Protection Scheme for Long-Term Storage
Christian Weinert, Denise Demirel, Martín Vigil, Matthias Geihs, Johannes Buchmann
Comments: Original Publication (in the same form): ASIACCS 2017
Journal-ref: ASIACCS 2017, pages 436-448
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1708.02175 [pdf, other]
Title: Classification and Analysis of Communication Protection Policy Anomalies
Fulvio Valenza, Cataldo Basile, Daniele Canavese, Antonio Lioy
Comments: Published on IEEE/ACM Transactions on Networking
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1708.02380 [pdf, other]
Title: Ghera: A Repository of Android App Vulnerability Benchmarks
Joydeep Mitra, Venkatesh-Prasad Ranganath
Comments: 10 pages. Accepted at PROMISE'17
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[25] arXiv:1708.02629 [pdf, other]
Title: Protecting Genomic Privacy by a Sequence-Similarity Based Obfuscation Method
Shibiao Wan, Man-Wai Mak, Sun-Yuan Kung
Comments: 5 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 161 entries : 1-25 26-50 51-75 76-100 ... 151-161
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack