Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2018

Total of 186 entries : 1-25 26-50 51-75 76-100 ... 176-186
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1809.00111 [pdf, other]
Title: What's a little leakage between friends?
Sebastian Angel, David Lazar, Ioanna Tzialla
Comments: Appears in WPES 2018. This update contains a minor clarification in Section 4 (last paragraph) and Section 4.1 (first paragraph) over the published version
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1809.00141 [pdf, other]
Title: A Graph Based Framework for Malicious Insider Threat Detection
Anagi Gamachchi, Li Sun, Serdar Boztas
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1809.00231 [pdf, other]
Title: Insider Threat Detection Through Attributed Graph Clustering
Anagi Gamachchi, Serdar Boztas
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[4] arXiv:1809.00312 [pdf, other]
Title: Secure transmission with covert requirement in untrusted relaying networks
Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani
Comments: 13 pages, 8 figures, TIFS journal
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[5] arXiv:1809.00371 [pdf, other]
Title: Post-Quantum Secure Cryptographic Algorithms
Xenia Bogomolec, Jochen Gerhard
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1809.00464 [pdf, other]
Title: Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective
Stefan Marksteiner
Comments: 4 pages, 1 figure, This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 773715, Proceedings of the 2018 IEEE 20th Conference on Business Informatics (CBI)
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1809.00469 [pdf, other]
Title: Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers
Stefan Marksteiner
Comments: 4 pages, 2 figures
Journal-ref: Proceedings of the 2018 IEEE 20th Conference on Business Informatics (CBI)
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1809.00615 [pdf, other]
Title: Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques
Dorjan Hitaj, Luigi V. Mancini
Comments: 7 pages, 4 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9] arXiv:1809.00745 [pdf, other]
Title: IoTDots: A Digital Forensics Framework for Smart Environments
Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1809.00825 [pdf, other]
Title: More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
Comments: 36 pages, Accepted in Asiacrypt 2018
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1809.01221 [pdf, other]
Title: CIDPro: Custom Instructions for Dynamic Program Diversification
Thinh Hung Pham, Alexander Fell, Arnab Kumar Biswas, Siew-Kei Lam, Nandeesha Veeranna
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[12] arXiv:1809.01320 [pdf, other]
Title: Multi-Client Order-Revealing Encryption
Jieun Eom, Dong Hoon Lee, Kwangsu Lee
Journal-ref: IEEE Access, 2018
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1809.01335 [pdf, other]
Title: A Threat Modeling Framework for Evaluating Computing Platforms Against Architectural Attacks
Seyyedeh Atefeh Musavi, Mahmoud Reza Hashemi
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:1809.01540 [pdf, other]
Title: Fail-Stop Group Signature Scheme
Yi-Yuan Chiang, Wang-Hsin Hsu, Wen-Yen Lin, Jonathan Jen-Rong Chen
Comments: 11 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1809.01562 [pdf, other]
Title: Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences
Haitao Du, Shanchieh Jay Yang
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1809.01620 [pdf, other]
Title: Blockmania: from Block DAGs to Consensus
George Danezis, David Hrycyszyn
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1809.01635 [pdf, other]
Title: A Differentially Private Wilcoxon Signed-Rank Test
Simon Couch, Zeki Kazan, Kaiyan Shi, Andrew Bray, Adam Groce
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[18] arXiv:1809.01697 [pdf, other]
Title: HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition
Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen
Comments: 8 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS); Signal Processing (eess.SP); Machine Learning (stat.ML)
[19] arXiv:1809.01715 [pdf, other]
Title: Bridging machine learning and cryptography in defence against adversarial attacks
Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[20] arXiv:1809.02077 [pdf, other]
Title: IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
Zilong Lin, Yong Shi, Zhi Xue
Comments: Accepted for publication in the 26th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2022)
Journal-ref: Advances in Knowledge Discovery and Data Mining. PAKDD 2022. Lecture Notes in Computer Science, vol.13282, 2022, pp.79-91
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[21] arXiv:1809.02152 [pdf, other]
Title: End-to-End Analysis of In-Browser Cryptojacking
Muhammad Saad, Aminollah Khormali, Aziz Mohaisen
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1809.02201 [pdf, other]
Title: Issues Encountered Deploying Differential Privacy
Simson L. Garfinkel, John M. Abowd, Sarah Powazek
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1809.02452 [pdf, other]
Title: Secure Generators of q-valued Pseudo-Random Sequences on Arithmetic Polynomials
Oleg Finko, Sergey Dichenko, Dmitry Samoylenko
Comments: 21ST INTERNATIONAL MULTI-CONFERENCE ON ADVANCED COMPUTER SYSTEMS ACS 2018 (Międzyzdroje, Poland, September 24-26, 2018)
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1809.02471 [pdf, other]
Title: Protection of Information from Imitation on the Basis of Crypt-Code Structures
Dmitry Samoylenko, Mikhail Eremeev, Oleg Finko, Sergey Dichenko
Comments: 21st International Multi-conference On Advanced Computer Systems Acs 2018 (Mi\K{E}Dzyzdroje, Poland, September 24-26, 2018)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1809.02575 [pdf, other]
Title: Differentially Private Continual Release of Graph Statistics
Shuang Song, Susan Little, Sanjay Mehta, Staal Vinterbo, Kamalika Chaudhuri
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
Total of 186 entries : 1-25 26-50 51-75 76-100 ... 176-186
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack