Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2017

Total of 161 entries : 1-25 26-50 51-75 76-100 101-125 ... 151-161
Showing up to 25 entries per page: fewer | more | all
[26] arXiv:1708.02749 [pdf, other]
Title: Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance
Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[27] arXiv:1708.02888 [pdf, other]
Title: Multi-message Authentication over Noisy Channel with Secure Channel Codes
Dajiang Chen, Ning Zhang, Nan Cheng, Kuan Zhang, Kan Yang, Zhiguang Qin, Xuemin Shen
Comments: 15 Pages, 15figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[28] arXiv:1708.02921 [pdf, other]
Title: Asymmetric Quantum Codes on Toric Surfaces
Johan P. Hansen
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Quantum Physics (quant-ph)
[29] arXiv:1708.03346 [pdf, other]
Title: Lempel-Ziv Jaccard Distance, an Effective Alternative to Ssdeep and Sdhash
Edward Raff, Charles K. Nicholas
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:1708.03387 [pdf, other]
Title: Multiparty Routing: Secure Routing for Mixnets
Fatemeh Shirazi, Elena Andreeva, Markulf Kohlweiss, Claudia Diaz
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1708.03468 [pdf, other]
Title: Key exchange with the help of a public ledger
Thanh Bui, Tuomas Aura
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1708.03513 [pdf, other]
Title: Early Stage Malware Prediction Using Recurrent Neural Networks
Matilda Rhode, Pete Burnap, Kevin Jones
Journal-ref: Computers & Security, Volume 77, August 2018, Pages 578-594
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1708.03520 [pdf, other]
Title: Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones
Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:1708.03766 [pdf, other]
Title: The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor
Comments: 55 pages
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1708.03778 [pdf, other]
Title: Chainspace: A Sharded Smart Contracts Platform
Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:1708.03807 [pdf, other]
Title: Principle of Need-to-Act
Ashish Kundu
Comments: 2 pages
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:1708.03978 [pdf, other]
Title: Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric
Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1708.04027 [pdf, other]
Title: Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
Comments: 24 pages, 14 figures
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1708.04278 [pdf, other]
Title: Sampling High Throughput Data for Anomaly Detection of Data-Base Activity
Hagit Grushka-Cohen, Oded Sofer, Ofer Biller, Michael Dymshits, Lior Rokach, Bracha Shapira
Comments: Proceedings of the 11th Pre-ICIS Workshop on Information Security and Privacy, Dublin, Ireland December 10, 2016
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40] arXiv:1708.04495 [pdf, other]
Title: Analysing Relations involving small number of Monomials in AES S- Box
Riddhi Ghosal
Comments: 5 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[41] arXiv:1708.04517 [pdf, other]
Title: Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution
Thông T. Nguyên, Siu Cheung Hui
Comments: 8 pages, Trustcom17
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[42] arXiv:1708.04571 [pdf, other]
Title: A Machine Learning Based Intrusion Detection System for Software Defined 5G Network
Jiaqi Li, Zhifeng Zhao, Rongpeng Li
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[43] arXiv:1708.04726 [pdf, other]
Title: Privacy-Enabled Biometric Search
Scott Streit, Brian Streit, Stephen Suffian
Comments: 5 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44] arXiv:1708.04748 [pdf, other]
Title: When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
Steven Goldfeder, Harry Kalodner, Dillon Reisman, Arvind Narayanan
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:1708.04749 [pdf, other]
Title: Greedy and Evolutionary Algorithms for Mining Relationship-Based Access Control Policies
Thang Bui, Scott D. Stoller, Jiajie Li
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1708.04774 [pdf, other]
Title: CLIMEX: A Wireless Physical Layer Security Protocol Based on Clocked Impulse Exchanges
Satyam Dwivedi, John Olof Nilsson, Panos Papadimitratos, Peter Händel
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1708.04798 [pdf, other]
Title: Design-Time Quantification of Integrity in Cyber-Physical-Systems
Eric Rothstein Morris, Carlos G. Murguia, Martín Ochoa
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1708.04866 [pdf, other]
Title: Economic Factors of Vulnerability Trade and Exploitation
Luca Allodi
Comments: 17 pages, 11 figures, 14 tables
Journal-ref: In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). ACM, New York, NY, USA, 1483-1499
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1708.04871 [pdf, other]
Title: SMAUG: Secure Mobile Authentication Using Gestures
Christian A. Gorke, Frederik Armknecht
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1708.04963 [pdf, other]
Title: Introducing the truly chaotic finite state machines and their applications in security field
Christophe Guyeux, Qianxue Wang, Xiole Fang, Jacques Bahi
Subjects: Cryptography and Security (cs.CR)
Total of 161 entries : 1-25 26-50 51-75 76-100 101-125 ... 151-161
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack