We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2017

[ total of 122 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-122 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:1706.00138 [pdf, ps, other]
Title: Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs
Comments: 4, 28th Annual Workshop of the Psychology of Programming Interest Group (PPIG), Delft, Netherlands, 2017
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[2]  arXiv:1706.00206 [pdf, ps, other]
Title: Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
Comments: 10 pages excl. bibliography
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[3]  arXiv:1706.00302 [pdf, other]
Title: When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security
Comments: Workshop on the Economics of Information Security (WEIS 2017)
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1706.00324 [pdf, ps, other]
Title: Order-Preserving Encryption Using Approximate Integer Common Divisors
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:1706.00887 [pdf, other]
Title: Wikipedia Vandal Early Detection: from User Behavior to User Embedding
Comments: 14 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computers and Society (cs.CY)
[6]  arXiv:1706.00891 [pdf, other]
Title: Spectrum-based deep neural networks for fraud detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[7]  arXiv:1706.00916 [pdf, other]
Title: A Survey on Security and Privacy Issues of Bitcoin
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1706.00947 [pdf, other]
Title: Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[9]  arXiv:1706.01140 [pdf, ps, other]
Title: xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1706.01324 [pdf, ps, other]
Title: A Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism
Comments: 7 pages, accepted by LISS 2017
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1706.01552 [pdf, other]
Title: $\mathcal{E}\text{psolute}$: Efficiently Querying Databases While Providing Differential Privacy
Comments: Camera-ready version for ACM CCS 2021
Journal-ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21)
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1706.01628 [pdf, other]
Title: Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[13]  arXiv:1706.01679 [pdf, other]
Title: On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control
Comments: 6 pages, 5 figures. Presented in the 3rd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2016) and published in the Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2016), 2016, pp. 155-160
Journal-ref: Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2016), 2016, pp. 155-160
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:1706.01730 [pdf, other]
Title: Blockchain based trust & authentication for decentralized sensor networks
Comments: 6 pages, double-column. Preprint version submitted to IEEE Security & Privacy, Special Issue on Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[15]  arXiv:1706.01739 [pdf, other]
Title: Multi Sensor-based Implicit User Identification
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16]  arXiv:1706.01742 [pdf, ps, other]
Title: Types for Location and Data Security in Cloud Environments
Comments: Short version to appear in Computer Security Foundations Symposium (CSF'17), August 2017
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:1706.01756 [pdf, other]
Title: Sharing Data Homomorphically Encrypted with Different Encryption Keys
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1706.01763 [pdf, other]
Title: Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation
Comments: 8 pages; 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[19]  arXiv:1706.01939 [pdf, other]
Title: Empirical Analysis of Password Reuse and Modification across Online Service
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1706.02387 [pdf, other]
Title: Detection of App Collusion Potential Using Logic Programming
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1706.02473 [pdf, other]
Title: Securing Databases from Probabilistic Inference
Comments: A short version of this paper has been accepted at the 30th IEEE Computer Security Foundations Symposium (CSF 2017)
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[22]  arXiv:1706.02610 [pdf, ps, other]
Title: CERT strategy to deal with phishing attacks
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:1706.02646 [pdf, ps, other]
Title: An effective and secure user authenticated protocol for Location based services in road networks
Comments: 8 pages,6 figures
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:1706.02693 [pdf, other]
Title: A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization
Comments: IEEE Global SIP Symposium on Control & Information Theoretic Approaches to Privacy and Security
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:1706.03006 [pdf, ps, other]
Title: Securing Application with Software Partitioning: A case study using SGX
Subjects: Cryptography and Security (cs.CR)
[ total of 122 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-122 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)