Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2017

Total of 128 entries : 1-25 26-50 51-75 76-100 ... 126-128
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1710.00011 [pdf, other]
Title: Checking and Enforcing Security through Opacity in Healthcare Applications
Rym Zrelli, Moez Yeddes, Nejib Ben Hadj-Alouane
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1710.00101 [pdf, other]
Title: Statistical Disclosure: Improved, Extended, and Resisted
Navid Emamdoost, Mohammad Sadeq Dousti, Rasool Jalili
Comments: SECURWARE 2012 : The Sixth International Conference on Emerging Security Information, Systems and Technologies
Journal-ref: SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies. (2012), pp. 119-125
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1710.00110 [pdf, other]
Title: Decentralized User-Centric Access Control using PubSub over Blockchain
Sayed Hadi Hashemi, Faraz Faghri, Roy H Campbell
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1710.00183 [pdf, other]
Title: Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1710.00208 [pdf, other]
Title: Efficient Dynamic Searchable Encryption with Forward Privacy
Mohammad Etemad, Alptekin Küpçü, Charalampos Papamanthou, David Evans
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1710.00217 [pdf, other]
Title: Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel
Anindya Maiti, Ryan Heard, Mohd Sabra, Murtuza Jadliwala
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1710.00381 [pdf, other]
Title: S-CHIRP: Secure Communication for Heterogeneous IoTs with Round-Robin Protection
Mike Borowczak, George Purdy
Comments: 6 Pages, 4 figures, 2 tables, IEEE International Conference on Consumer Electronics
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1710.00390 [pdf, other]
Title: Computation on Encrypted Data using Data Flow Authentication
Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1710.00458 [pdf, other]
Title: ObliDB: Oblivious Query Processing for Secure Databases
Saba Eskandarian, Matei Zaharia
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1710.00516 [pdf, other]
Title: Data hiding in Fingerprint Minutiae Template for Privacy Protection
Sheng Li, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, Xinpeng Zhang
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1710.00551 [pdf, other]
Title: Another Flip in the Wall of Rowhammer Defenses
Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom
Comments: Preprint of the work accepted at the 39th IEEE Symposium on Security and Privacy 2018
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1710.00714 [pdf, other]
Title: Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy
Ata Turk, Mayank Varia, Georgios Kellaris
Comments: 6 pages, ICDM PAIS
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[13] arXiv:1710.00901 [pdf, other]
Title: Prochlo: Strong Privacy for Analytics in the Crowd
Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Usharsee Kode, Julien Tinnes, Bernhard Seefeld
Journal-ref: Proceedings of the 26th Symposium on Operating Systems Principles (SOSP), pp. 441-459, 2017
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1710.00942 [pdf, other]
Title: Neural Trojans
Yuntao Liu, Yang Xie, Ankur Srivastava
Comments: The shorth-length version of this paper is to appear in the 2017 IEEE International Conference on Computer Design (ICCD)
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1710.01026 [pdf, other]
Title: An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks
Stefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf
Comments: 7 pages, 6 figures
Journal-ref: Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense (2016) 37-43
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1710.01139 [pdf, other]
Title: On Secure and Usable Program Obfuscation: A Survey
Hui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[17] arXiv:1710.01230 [pdf, other]
Title: Multi-layer architecture for efficient steganalysis of Undermp3cover in multi-encoder scenario
Hamzeh Ghasemzadeh
Comments: 9 pages, 7 tables, 6 figures, journal paper
Journal-ref: IEEE Transactions on Information Forensics and Security, 2018
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[18] arXiv:1710.01367 [pdf, other]
Title: Validating Computer Security Methods: Meta-methodology for an Adversarial Science
Antonio Roque
Comments: v3: wording changes, clarification of figures
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1710.01387 [pdf, other]
Title: Cloaker Catcher: A Client-based Cloaking Detection System
Ruian Duan, Weiren Wang, Wenke Lee
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1710.01430 [pdf, other]
Title: SpaceTEE: Secure and Tamper-Proof Computing in Space using CubeSats
Yan Michalevsky, Yonatan Winetraub
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1710.01567 [pdf, other]
Title: Cloud/fog computing resource management and pricing for blockchain networks
Zehui Xiong, Shaohan Feng, Wenbo Wang, Dusit Niyato, Ping Wang, Zhu Han
Comments: 16 pages, double-column version, accepted by IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[22] arXiv:1710.01615 [pdf, other]
Title: ($k$,$ε$)-Anonymity: $k$-Anonymity with $ε$-Differential Privacy
Naoise Holohan, Spiros Antonatos, Stefano Braghin, Pól Mac Aonghusa
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Probability (math.PR)
[23] arXiv:1710.01928 [pdf, other]
Title: NTRUCipher-Lattice Based Secret Key Encryption
Maheswara Rao Valluri
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1710.02019 [pdf, other]
Title: A User-Centric System for Verified Identities on the Bitcoin Blockchain
Daniel Augot (GRACE), Hervé Chabanne, Thomas Chenevier, William George (LIX, GRACE), Laurent Lamber
Journal-ref: International Workshop on Cryptocurrencies and Blockchain Technology - CBT'17, Sep 2017, Oslo, Norway
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[25] arXiv:1710.02026 [pdf, other]
Title: Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques
Abhrajit Sengupta, Satwik Patnaik, Johann Knechtel, Mohammed Ashraf, Siddharth Garg, Ozgur Sinanoglu
Comments: Published in Proc. International Conference On Computer Aided Design (ICCAD) 2017; [v2] minor fix Fig 11: avg area overhead for g-type2 was miscalculated; [v3] added DOI to PDF footer
Subjects: Cryptography and Security (cs.CR)
Total of 128 entries : 1-25 26-50 51-75 76-100 ... 126-128
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack