Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2018

Total of 170 entries : 1-50 51-100 101-150 151-170
Showing up to 50 entries per page: fewer | more | all
[151] arXiv:1801.06810 (cross-list from cs.SE) [pdf, other]
Title: Guidelines for Systematic Mapping Studies in Security Engineering
Michael Felderer, Jeffrey C. Carver
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[152] arXiv:1801.06825 (cross-list from cs.SI) [pdf, other]
Title: Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks
Cheng Wang, Bo Yang
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[153] arXiv:1801.06827 (cross-list from cs.SI) [pdf, other]
Title: Artificial Impostors for Location Privacy Preservation
Cheng Wang, Zhiyang Xie
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[154] arXiv:1801.07003 (cross-list from cs.IT) [pdf, other]
Title: Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography
Peter Beelen, Martin Bossert, Sven Puchinger, Johan Rosenkilde
Comments: 5 pages, accepted at: IEEE International Symposium on Information Theory 2018
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[155] arXiv:1801.07175 (cross-list from cs.CL) [pdf, other]
Title: Adversarial Texts with Gradient Methods
Zhitao Gong, Wenlu Wang, Bo Li, Dawn Song, Wei-Shinn Ku
Comments: This work lacks some crucial details. After careful discussion, we decided to withdraw it temporarily and resubmit a full version afterward
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[156] arXiv:1801.07215 (cross-list from cs.AI) [pdf, other]
Title: Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing
Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Databases (cs.DB); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[157] arXiv:1801.07301 (cross-list from cs.DS) [pdf, other]
Title: Secure $k$-ish Nearest Neighbors Classifier
Hayim Shaul, Dan Feldman, Daniela Rus
Subjects: Data Structures and Algorithms (cs.DS); Computational Geometry (cs.CG); Cryptography and Security (cs.CR)
[158] arXiv:1801.07356 (cross-list from cs.IT) [pdf, other]
Title: Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems
Dongyang Xu, Pinyi Ren, James A. Ritcey, Yichen Wang
Comments: accepted to IEEE Transactions on Information Forensics and Security, Jan. 2018
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[159] arXiv:1801.07434 (cross-list from quant-ph) [pdf, other]
Title: Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack
Georgios M. Nikolopoulos
Comments: Close to the published version
Journal-ref: Physical Review A 97, 012324 (2018)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[160] arXiv:1801.07484 (cross-list from cs.IT) [pdf, other]
Title: Protograph-based Quasi-Cyclic MDPC Codes for McEliece Cryptosystems
Gianluigi Liva, Hannes Bartz
Comments: 5 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[161] arXiv:1801.08926 (cross-list from cs.CV) [pdf, other]
Title: Deflecting Adversarial Attacks with Pixel Deflection
Aaditya Prakash, Nick Moran, Solomon Garber, Antonella DiLillo, James Storer
Comments: Accepted to IEEE CVPR 2018 as Spotlight
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[162] arXiv:1801.09250 (cross-list from cs.OS) [pdf, other]
Title: Virtual Breakpoints for x86/64
Gregory Michael Price
Comments: 12 Pages, Presented at BSides Las Vegas 2019
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[163] arXiv:1801.09577 (cross-list from cs.NI) [pdf, other]
Title: First Demonstration of an Automatic Multilayer Intent-Based Secure Service Creation by an Open Source SDN Orchestrator
Thomas Szyrkowiec, Michele Santuari, Mohit Chamania, Domenico Siracusa, Achim Autenrieth, Victor Lopez
Comments: Parts of the presented work has received funding from the European Commission within the H2020 Research and Innovation Programme, under grant agreeement n.645127, project ACINO
Journal-ref: ECOC 2016 - Post Deadline Paper - 42nd European Conference on Optical Communication (see https://www.vde-verlag.de/proceedings-de/454283011.html)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[164] arXiv:1801.09741 (cross-list from cs.MM) [pdf, other]
Title: An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data
Muhammad Kamran, Muddassar Farooq
Comments: A shortened version of this work was published in IEEE Transactions on Knowledge and Data Engineering in 2012
Journal-ref: IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 11, pp. 1950-1962, 2012
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[165] arXiv:1801.10228 (cross-list from cs.DC) [pdf, other]
Title: Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, Jason Yellick
Comments: Appears in proceedings of EuroSys 2018 conference
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[166] arXiv:1801.10294 (cross-list from cs.NI) [pdf, other]
Title: Protecting Privacy in VANETs Using Mix Zones With Virtual Pseudonym Change
Belal Amro
Comments: 10 pages, 3 figures, 3 tables
Journal-ref: International Journal of Network Security & Its Applications volume 10 number 1 2018
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[167] arXiv:1801.10295 (cross-list from cs.CY) [pdf, other]
Title: A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain
Yining Hu, Ahsan Manzoor, Parinya Ekparinya, Madhusanka Liyanage, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne, Mika E Ylianttila
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[168] arXiv:1801.10323 (cross-list from cs.DB) [pdf, other]
Title: Privacy-Preserving Secret Shared Computations using MapReduce
Shlomi Dolev, Peeyush Gupta, Yin Li, Sharad Mehrotra, Shantanu Sharma
Comments: IEEE Transactions on Dependable and Secure Computing, Accepted 01 Aug. 2019
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[169] arXiv:1801.10365 (cross-list from cs.CV) [pdf, other]
Title: Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning
Haichao Shi, Xiao-Yu Zhang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[170] arXiv:1801.10578 (cross-list from stat.ML) [pdf, other]
Title: Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach
Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel
Comments: Accepted by Sixth International Conference on Learning Representations (ICLR 2018). Tsui-Wei Weng and Huan Zhang contributed equally
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 170 entries : 1-50 51-100 101-150 151-170
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack