Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2017

Total of 161 entries : 1-50 51-100 101-150 126-161 151-161
Showing up to 50 entries per page: fewer | more | all
[126] arXiv:1708.09790 [pdf, other]
Title: Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim
Comments: This paper is an extended version of a paper accepted to ACM CCS 2017
Subjects: Cryptography and Security (cs.CR)
[127] arXiv:1708.00433 (cross-list from quant-ph) [pdf, other]
Title: Composable security in relativistic quantum cryptography
V. Vilasini, Christopher Portmann, Lidia del Rio
Comments: Clarified definitions and formulations, clarified how causal boxes are instantiated, strengthened results
Journal-ref: New J. Phys. 21, 043057 (2019)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[128] arXiv:1708.01285 (cross-list from cs.DC) [pdf, other]
Title: Proof of Work Without All the Work: Computationally Efficient Attack-Resistant Systems
Diksha Gupta, Jared Saia, Maxwell Young
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[129] arXiv:1708.01862 (cross-list from cs.IT) [pdf, other]
Title: A combination chaotic system and application in color image encryption
R. Parvaz, M. Zarebnia
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[130] arXiv:1708.02130 (cross-list from quant-ph) [pdf, html, other]
Title: Classical Homomorphic Encryption for Quantum Circuits
Urmila Mahadev
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[131] arXiv:1708.02419 (cross-list from cs.NI) [pdf, other]
Title: Towards a Concurrent and Distributed Route Selection for Payment Channel Networks
Elias Rohrer, Jann-Frederik Laß, Florian Tschorsch
Comments: 8 pages
Journal-ref: ESORICS 2017, DPM 2017, CBT 2017. Lecture Notes in Computer Science, vol 10436
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[132] arXiv:1708.02793 (cross-list from nlin.CD) [pdf, other]
Title: Diffusion and confusion of chaotic iteration based hash functions
Zhuosheng Lin, Christophe Guyeux, Qianxue Wang, Simin Yu
Subjects: Chaotic Dynamics (nlin.CD); Cryptography and Security (cs.CR)
[133] arXiv:1708.02872 (cross-list from cs.CV) [pdf, other]
Title: Privacy Preserving Face Retrieval in the Cloud for Mobile Users
Xin Jin, Shiming Ge, Chenggen Song
Comments: Abuse Preventive Data Mining (APDM2017, IJCAI Workshop), 19-25 August, 2017 Melbourne, Australia
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[134] arXiv:1708.03243 (cross-list from nlin.CD) [pdf, other]
Title: Summary of Topological Study of Chaotic CBC Mode of Operation
Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallègue, Mohsen Machhout
Comments: arXiv admin note: text overlap with arXiv:1605.02950, arXiv:1608.05838, arXiv:1601.08139
Subjects: Chaotic Dynamics (nlin.CD); Cryptography and Security (cs.CR)
[135] arXiv:1708.03366 (cross-list from cs.LG) [pdf, other]
Title: Resilient Linear Classification: An Approach to Deal with Attacks on Training Data
Sangdon Park, James Weimer, Insup Lee
Comments: Accepted as a conference paper at ICCPS17
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[136] arXiv:1708.03389 (cross-list from cs.DC) [pdf, other]
Title: A Logical Approach to Cloud Federation
Qiang Cao, Yuanjun Yao, Jeff Chase
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[137] arXiv:1708.03495 (cross-list from cs.DS) [pdf, other]
Title: Algorithms based on *-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing
Gábor Ivanyos, Youming Qiao
Comments: 41 pages; improved presentation; accepted to SICOMP
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[138] arXiv:1708.03999 (cross-list from stat.ML) [pdf, other]
Title: ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh
Comments: Accepted by 10th ACM Workshop on Artificial Intelligence and Security (AISEC) with the 24th ACM Conference on Computer and Communications Security (CCS)
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[139] arXiv:1708.04051 (cross-list from cs.IT) [pdf, other]
Title: Improving Secrecy with Nearly Collinear Main and Wiretap Channels via a Cooperative Jamming Relay
Shuai Han, Sai Xu, Weixiao Meng, Cheng Li
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[140] arXiv:1708.04070 (cross-list from cs.LO) [pdf, other]
Title: Timed Epistemic Knowledge Bases for Social Networks (Extended Version)
Raúl Pardo, César Sánchez, Gerardo Schneider
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[141] arXiv:1708.04301 (cross-list from cs.MM) [pdf, other]
Title: Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API
Hossein Hosseini, Baicen Xiao, Andrew Clark, Radha Poovendran
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[142] arXiv:1708.04399 (cross-list from cs.HC) [pdf, other]
Title: Continuous User Authentication via Unlabeled Phone Movement Patterns
Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha
Comments: IEEE International Joint Conference on Biometrics (IJCB 2017), Denver, Colorado
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[143] arXiv:1708.04872 (cross-list from cs.CY) [pdf, other]
Title: Taxonomy of Blockchain Technologies. Principles of Identification and Classification
Paolo Tasca, Claudio J. Tessone
Comments: 43 pages, 1 figure
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[144] arXiv:1708.04955 (cross-list from q-fin.GN) [pdf, other]
Title: qBitcoin: A Peer-to-Peer Quantum Cash System
Kazuki Ikeda
Comments: 11 pages, 2 figures
Journal-ref: Proceedings of the 2018 Computing Conference
Subjects: General Finance (q-fin.GN); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[145] arXiv:1708.05665 (cross-list from cs.DB) [pdf, other]
Title: Untangling Blockchain: A Data Processing View of Blockchain Systems
Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, Ji Wang
Comments: arXiv admin note: text overlap with arXiv:1703.04057
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[146] arXiv:1708.05926 (cross-list from cs.SI) [pdf, other]
Title: Tamper-Evident Complex Genomic Networks
Komal Batool, Muaz A. Niazi
Comments: 14 pages, 8 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Databases (cs.DB); Networking and Internet Architecture (cs.NI)
[147] arXiv:1708.05970 (cross-list from cs.MM) [pdf, other]
Title: An improved watermarking scheme for Internet applications
Christophe Guyeux, Jacques M. Bahi
Comments: Proceedings of INTERNET'2010, 2nd Int. Conf. on Evolving Internet. Valencia (Spain), September 20-25, 2010. pp. 119-124
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[148] arXiv:1708.07313 (cross-list from cs.IT) [pdf, other]
Title: Secure Channel for Molecular Communications
S. M. Riazul Islam, Farman Ali, Hyeonjoon Moon, Kyung-Sup Kwak
Comments: 4 pages, 5 figures, ICTC 2017
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[149] arXiv:1708.07359 (cross-list from quant-ph) [pdf, other]
Title: Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo, Alex Grilo, Stacey Jeffery, Thomas Vidick
Comments: 66 pages, 26 figures
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[150] arXiv:1708.07436 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Regression for Discrete-Time Survival Analysis
Thông T. Nguyên, Siu Cheung Hui
Comments: 19 pages, CIKM17
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Databases (cs.DB)
[151] arXiv:1708.08022 (cross-list from stat.ML) [pdf, other]
Title: On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches
Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang
Journal-ref: IEEE 30th Computer Security Foundations Symposium (CSF), pages 1--6, 2017
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[152] arXiv:1708.08189 (cross-list from cs.CV) [pdf, other]
Title: An IoT Real-Time Biometric Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform
Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty, Qais A. Habash
Comments: 6 pages, 8 figures, IoT, Authentication, ECG, DCT
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[153] arXiv:1708.08191 (cross-list from cs.DB) [pdf, other]
Title: T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework
Xiaofei Wang (1), Qianhong Wu (2), Yuqing Zhang (1) ((1) National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, P.R. China, (2) School of Electronic and Information Engineering, Beihang University, Beijing, P.R. China)
Comments: 37 pages. 12 figures. 6 tables. Source codes and syntax rules are available at this http URL
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[154] arXiv:1708.08228 (cross-list from cs.NI) [pdf, other]
Title: Provably Secure Networks: Methodology and Toolset for Configuration Management
Cornelius Diekmann
Comments: PhD thesis
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[155] arXiv:1708.08245 (cross-list from cs.CV) [pdf, other]
Title: Digital image splicing detection based on Markov features in QDCT and QWT domain
Ruxin Wang, Wei Lu, Shijun Xiang, Xianfeng Zhao, Jinwei Wang
Comments: We found that in the experiments all the features are not normalized with the same parameter and setup. So the whole experiments must be re-done since the data is not proper for its current state. Maybe the method should be re-designed
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[156] arXiv:1708.08814 (cross-list from math.GR) [pdf, other]
Title: Wave-Shaped Round Functions and Primitive Groups
Riccardo Aragona, Marco Calderini, Roberto Civino, Massimiliano Sala, Ilaria Zappatore
Journal-ref: Advances in Mathematics of Communications, Vol. 13 No. 1, February 2019
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[157] arXiv:1708.09013 (cross-list from cs.LO) [pdf, other]
Title: Verifying Security Policies in Multi-agent Workflows with Loops
Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zălinescu
Comments: Authors' version of the corresponding CCS 2017 conference paper
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[158] arXiv:1708.09156 (cross-list from quant-ph) [pdf, other]
Title: Quantum Fully Homomorphic Encryption With Verification
Gorjan Alagic, Yfke Dulek, Christian Schaffner, Florian Speelman
Comments: 30 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[159] arXiv:1708.09171 (cross-list from cs.DB) [pdf, other]
Title: Enforcing Privacy in Cloud Databases
Somayeh Sobati Moghadam (1), Jérôme Darmont (1), Gérald Gavin (1) ((1) ERIC)
Journal-ref: 19th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2017), Aug 2017, Lyon, France. Springer, Lecture Notes in Computer Science, 10440, pp.53-73, 2017
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[160] arXiv:1708.09332 (cross-list from cs.DC) [pdf, other]
Title: Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies
Sinica Alboaie, Doina Cosovan
Comments: DAIS 2017
Journal-ref: IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2017: Distributed Applications and Interoperable Systems pp 83-98
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Databases (cs.DB)
[161] arXiv:1708.09419 (cross-list from cs.DC) [pdf, other]
Title: Proposal for a fully decentralized blockchain and proof-of-work algorithm for solving NP-complete problems
Carlos G. Oliver, Alessandro Ricottone, Pericles Philippopoulos
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
Total of 161 entries : 1-50 51-100 101-150 126-161 151-161
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack