Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2017

Total of 161 entries : 1-25 76-100 101-125 126-150 151-161
Showing up to 25 entries per page: fewer | more | all
[151] arXiv:1708.08022 (cross-list from stat.ML) [pdf, other]
Title: On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches
Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang
Journal-ref: IEEE 30th Computer Security Foundations Symposium (CSF), pages 1--6, 2017
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[152] arXiv:1708.08189 (cross-list from cs.CV) [pdf, other]
Title: An IoT Real-Time Biometric Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform
Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty, Qais A. Habash
Comments: 6 pages, 8 figures, IoT, Authentication, ECG, DCT
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[153] arXiv:1708.08191 (cross-list from cs.DB) [pdf, other]
Title: T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework
Xiaofei Wang (1), Qianhong Wu (2), Yuqing Zhang (1) ((1) National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, P.R. China, (2) School of Electronic and Information Engineering, Beihang University, Beijing, P.R. China)
Comments: 37 pages. 12 figures. 6 tables. Source codes and syntax rules are available at this http URL
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[154] arXiv:1708.08228 (cross-list from cs.NI) [pdf, other]
Title: Provably Secure Networks: Methodology and Toolset for Configuration Management
Cornelius Diekmann
Comments: PhD thesis
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[155] arXiv:1708.08245 (cross-list from cs.CV) [pdf, other]
Title: Digital image splicing detection based on Markov features in QDCT and QWT domain
Ruxin Wang, Wei Lu, Shijun Xiang, Xianfeng Zhao, Jinwei Wang
Comments: We found that in the experiments all the features are not normalized with the same parameter and setup. So the whole experiments must be re-done since the data is not proper for its current state. Maybe the method should be re-designed
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[156] arXiv:1708.08814 (cross-list from math.GR) [pdf, other]
Title: Wave-Shaped Round Functions and Primitive Groups
Riccardo Aragona, Marco Calderini, Roberto Civino, Massimiliano Sala, Ilaria Zappatore
Journal-ref: Advances in Mathematics of Communications, Vol. 13 No. 1, February 2019
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[157] arXiv:1708.09013 (cross-list from cs.LO) [pdf, other]
Title: Verifying Security Policies in Multi-agent Workflows with Loops
Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zălinescu
Comments: Authors' version of the corresponding CCS 2017 conference paper
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[158] arXiv:1708.09156 (cross-list from quant-ph) [pdf, other]
Title: Quantum Fully Homomorphic Encryption With Verification
Gorjan Alagic, Yfke Dulek, Christian Schaffner, Florian Speelman
Comments: 30 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[159] arXiv:1708.09171 (cross-list from cs.DB) [pdf, other]
Title: Enforcing Privacy in Cloud Databases
Somayeh Sobati Moghadam (1), Jérôme Darmont (1), Gérald Gavin (1) ((1) ERIC)
Journal-ref: 19th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2017), Aug 2017, Lyon, France. Springer, Lecture Notes in Computer Science, 10440, pp.53-73, 2017
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[160] arXiv:1708.09332 (cross-list from cs.DC) [pdf, other]
Title: Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies
Sinica Alboaie, Doina Cosovan
Comments: DAIS 2017
Journal-ref: IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2017: Distributed Applications and Interoperable Systems pp 83-98
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Databases (cs.DB)
[161] arXiv:1708.09419 (cross-list from cs.DC) [pdf, other]
Title: Proposal for a fully decentralized blockchain and proof-of-work algorithm for solving NP-complete problems
Carlos G. Oliver, Alessandro Ricottone, Pericles Philippopoulos
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
Total of 161 entries : 1-25 76-100 101-125 126-150 151-161
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack