Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2017

Total of 161 entries : 1-25 51-75 76-100 101-125 126-150 151-161
Showing up to 25 entries per page: fewer | more | all
[126] arXiv:1708.09790 [pdf, other]
Title: Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim
Comments: This paper is an extended version of a paper accepted to ACM CCS 2017
Subjects: Cryptography and Security (cs.CR)
[127] arXiv:1708.00433 (cross-list from quant-ph) [pdf, other]
Title: Composable security in relativistic quantum cryptography
V. Vilasini, Christopher Portmann, Lidia del Rio
Comments: Clarified definitions and formulations, clarified how causal boxes are instantiated, strengthened results
Journal-ref: New J. Phys. 21, 043057 (2019)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[128] arXiv:1708.01285 (cross-list from cs.DC) [pdf, other]
Title: Proof of Work Without All the Work: Computationally Efficient Attack-Resistant Systems
Diksha Gupta, Jared Saia, Maxwell Young
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[129] arXiv:1708.01862 (cross-list from cs.IT) [pdf, other]
Title: A combination chaotic system and application in color image encryption
R. Parvaz, M. Zarebnia
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[130] arXiv:1708.02130 (cross-list from quant-ph) [pdf, html, other]
Title: Classical Homomorphic Encryption for Quantum Circuits
Urmila Mahadev
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[131] arXiv:1708.02419 (cross-list from cs.NI) [pdf, other]
Title: Towards a Concurrent and Distributed Route Selection for Payment Channel Networks
Elias Rohrer, Jann-Frederik Laß, Florian Tschorsch
Comments: 8 pages
Journal-ref: ESORICS 2017, DPM 2017, CBT 2017. Lecture Notes in Computer Science, vol 10436
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[132] arXiv:1708.02793 (cross-list from nlin.CD) [pdf, other]
Title: Diffusion and confusion of chaotic iteration based hash functions
Zhuosheng Lin, Christophe Guyeux, Qianxue Wang, Simin Yu
Subjects: Chaotic Dynamics (nlin.CD); Cryptography and Security (cs.CR)
[133] arXiv:1708.02872 (cross-list from cs.CV) [pdf, other]
Title: Privacy Preserving Face Retrieval in the Cloud for Mobile Users
Xin Jin, Shiming Ge, Chenggen Song
Comments: Abuse Preventive Data Mining (APDM2017, IJCAI Workshop), 19-25 August, 2017 Melbourne, Australia
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[134] arXiv:1708.03243 (cross-list from nlin.CD) [pdf, other]
Title: Summary of Topological Study of Chaotic CBC Mode of Operation
Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallègue, Mohsen Machhout
Comments: arXiv admin note: text overlap with arXiv:1605.02950, arXiv:1608.05838, arXiv:1601.08139
Subjects: Chaotic Dynamics (nlin.CD); Cryptography and Security (cs.CR)
[135] arXiv:1708.03366 (cross-list from cs.LG) [pdf, other]
Title: Resilient Linear Classification: An Approach to Deal with Attacks on Training Data
Sangdon Park, James Weimer, Insup Lee
Comments: Accepted as a conference paper at ICCPS17
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[136] arXiv:1708.03389 (cross-list from cs.DC) [pdf, other]
Title: A Logical Approach to Cloud Federation
Qiang Cao, Yuanjun Yao, Jeff Chase
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[137] arXiv:1708.03495 (cross-list from cs.DS) [pdf, other]
Title: Algorithms based on *-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing
Gábor Ivanyos, Youming Qiao
Comments: 41 pages; improved presentation; accepted to SICOMP
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[138] arXiv:1708.03999 (cross-list from stat.ML) [pdf, other]
Title: ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh
Comments: Accepted by 10th ACM Workshop on Artificial Intelligence and Security (AISEC) with the 24th ACM Conference on Computer and Communications Security (CCS)
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[139] arXiv:1708.04051 (cross-list from cs.IT) [pdf, other]
Title: Improving Secrecy with Nearly Collinear Main and Wiretap Channels via a Cooperative Jamming Relay
Shuai Han, Sai Xu, Weixiao Meng, Cheng Li
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[140] arXiv:1708.04070 (cross-list from cs.LO) [pdf, other]
Title: Timed Epistemic Knowledge Bases for Social Networks (Extended Version)
Raúl Pardo, César Sánchez, Gerardo Schneider
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[141] arXiv:1708.04301 (cross-list from cs.MM) [pdf, other]
Title: Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API
Hossein Hosseini, Baicen Xiao, Andrew Clark, Radha Poovendran
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[142] arXiv:1708.04399 (cross-list from cs.HC) [pdf, other]
Title: Continuous User Authentication via Unlabeled Phone Movement Patterns
Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha
Comments: IEEE International Joint Conference on Biometrics (IJCB 2017), Denver, Colorado
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[143] arXiv:1708.04872 (cross-list from cs.CY) [pdf, other]
Title: Taxonomy of Blockchain Technologies. Principles of Identification and Classification
Paolo Tasca, Claudio J. Tessone
Comments: 43 pages, 1 figure
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[144] arXiv:1708.04955 (cross-list from q-fin.GN) [pdf, other]
Title: qBitcoin: A Peer-to-Peer Quantum Cash System
Kazuki Ikeda
Comments: 11 pages, 2 figures
Journal-ref: Proceedings of the 2018 Computing Conference
Subjects: General Finance (q-fin.GN); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[145] arXiv:1708.05665 (cross-list from cs.DB) [pdf, other]
Title: Untangling Blockchain: A Data Processing View of Blockchain Systems
Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, Ji Wang
Comments: arXiv admin note: text overlap with arXiv:1703.04057
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[146] arXiv:1708.05926 (cross-list from cs.SI) [pdf, other]
Title: Tamper-Evident Complex Genomic Networks
Komal Batool, Muaz A. Niazi
Comments: 14 pages, 8 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Databases (cs.DB); Networking and Internet Architecture (cs.NI)
[147] arXiv:1708.05970 (cross-list from cs.MM) [pdf, other]
Title: An improved watermarking scheme for Internet applications
Christophe Guyeux, Jacques M. Bahi
Comments: Proceedings of INTERNET'2010, 2nd Int. Conf. on Evolving Internet. Valencia (Spain), September 20-25, 2010. pp. 119-124
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[148] arXiv:1708.07313 (cross-list from cs.IT) [pdf, other]
Title: Secure Channel for Molecular Communications
S. M. Riazul Islam, Farman Ali, Hyeonjoon Moon, Kyung-Sup Kwak
Comments: 4 pages, 5 figures, ICTC 2017
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[149] arXiv:1708.07359 (cross-list from quant-ph) [pdf, other]
Title: Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo, Alex Grilo, Stacey Jeffery, Thomas Vidick
Comments: 66 pages, 26 figures
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[150] arXiv:1708.07436 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Regression for Discrete-Time Survival Analysis
Thông T. Nguyên, Siu Cheung Hui
Comments: 19 pages, CIKM17
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Databases (cs.DB)
Total of 161 entries : 1-25 51-75 76-100 101-125 126-150 151-161
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack