We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jul 2015, skipping first 50

[ total of 77 entries: 1-10 | ... | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-77 ]
[ showing 10 entries per page: fewer | more | all ]
[51]  arXiv:1507.08258 [pdf, ps, other]
Title: Perfect Secrecy under Deep Random assumption
Comments: 30 pages main and 48 pages annex. V12: A more accurate proof of Theorem 1 is given, where Advantage Distillation is proved without the use of Maurer error correcting technique. Addition of a more precise and more efficient method to generate recursively each new distribution in the Deep Random Generator described in section 4
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:1507.08309 [pdf, other]
Title: Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:1507.08475 [pdf, other]
Title: aDTN - Undetectable Communication in Wireless Delay-tolerant Networks (Working Draft)
Authors: Ana Barroso
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[54]  arXiv:1507.08514 [pdf, other]
Title: Investigating SRAM PUFs in large CPUs and GPUs
Comments: 25 pages, 6 figures. Code in appendix
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:1507.08694 [pdf, other]
Title: Android Tapjacking Vulnerability
Authors: Benjamin Lim
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:1507.08838 [pdf, other]
Title: Auditable Versioned Data Storage Outsourcing
Comments: 31 Pages, 12 Figures, 2 Tables, 4 Pseudocodes
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[57]  arXiv:1507.00245 (cross-list from cs.DC) [pdf, other]
Title: Performance analysis of a Tor-like onion routing implementation
Comments: 6 pages, 6 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[58]  arXiv:1507.01083 (cross-list from cs.SC) [pdf, ps, other]
Title: Interactive certificate for the verification of Wiedemann's Krylov sequence: application to the certification of the determinant, the minimal and the characteristic polynomials of sparse matrices
Subjects: Symbolic Computation (cs.SC); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[59]  arXiv:1507.02266 (cross-list from cs.IT) [pdf, ps, other]
Title: Secure Degrees of Freedom of Multi-user Networks: One-Time-Pads in the Air via Alignment
Comments: To appear in Proceedings of the IEEE, special issue on Physical Layer Security and its Applications. arXiv admin note: text overlap with arXiv:1404.7478, arXiv:1209.5370
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[60]  arXiv:1507.02482 (cross-list from cs.DS) [pdf, other]
Title: Differentially Private Ordinary Least Squares
Authors: Or Sheffet
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 77 entries: 1-10 | ... | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-77 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)