We gratefully acknowledge support from
the Simons Foundation
and member institutions

Cryptography and Security

Authors and titles for recent submissions

[ total of 30 entries: 1-25 | 26-30 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 16 Aug 2017

[1]  arXiv:1708.04571 [pdf, ps, other]
Title: A Machine Learning Based Intrusion Detection System for Software Defined 5G Network
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[2]  arXiv:1708.04517 [pdf, other]
Title: Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution
Comments: 8 pages, Trustcom17
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[3]  arXiv:1708.04495 [pdf, ps, other]
Title: Analysing Relations involving small number of Monomials in AES S- Box
Authors: Riddhi Ghosal
Comments: 5 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1708.04278 [pdf]
Title: Sampling High Throughput Data for Anomaly Detection of Data-Base Activity
Comments: Proceedings of the 11th Pre-ICIS Workshop on Information Security and Privacy, Dublin, Ireland December 10, 2016
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
[5]  arXiv:1708.04399 (cross-list from cs.HC) [pdf, other]
Title: Continuous User Authentication via Unlabeled Phone Movement Patterns
Comments: IEEE International Joint Conference on Biometrics (IJCB 2017), Denver, Colorado
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[6]  arXiv:1708.04301 (cross-list from cs.MM) [pdf, other]
Title: Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Tue, 15 Aug 2017

[7]  arXiv:1708.04027 [pdf, other]
Title: Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
Comments: 24 pages, 14 figures
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1708.03978 [pdf, other]
Title: Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:1708.03807 [pdf, other]
Title: Principle of Need-to-Act
Authors: Ashish Kundu
Comments: 2 pages
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1708.03778 [pdf, other]
Title: Chainspace: A Sharded Smart Contracts Platform
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1708.03766 [pdf, other]
Title: The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
Comments: 41 pages, 6 figures, 20 tables
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1708.04070 (cross-list from cs.LO) [pdf, ps, other]
Title: Timed Epistemic Knowledge Bases for Social Networks (Extended Version)
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[13]  arXiv:1708.04051 (cross-list from cs.IT) [pdf, other]
Title: Improving Secrecy with Nearly Collinear Main and Wiretap Channels via a Cooperative Jamming Relay
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[14]  arXiv:1708.03999 (cross-list from stat.ML) [pdf, other]
Title: ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Learning (cs.LG)

Mon, 14 Aug 2017

[15]  arXiv:1708.03520 [pdf, other]
Title: Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:1708.03513 [pdf, other]
Title: Early Stage Malware Prediction Using Recurrent Neural Networks
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:1708.03468 [pdf, other]
Title: Key exchange with the help of a public ledger
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1708.03387 [pdf, other]
Title: Multiparty Routing: Secure Routing for Mixnets
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:1708.03346 [pdf, other]
Title: Lempel-Ziv Jaccard Distance, an Effective Alternative to Ssdeep and Sdhash
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1708.03495 (cross-list from cs.DS) [pdf, ps, other]
Title: Algorithms based on *-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing
Comments: 35 pages
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[21]  arXiv:1708.03389 (cross-list from cs.DC) [pdf, other]
Title: A Logical Approach to Cloud Federation
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[22]  arXiv:1708.03366 (cross-list from cs.LG) [pdf, other]
Title: Resilient Linear Classification: An Approach to Deal with Attacks on Training Data
Comments: Accepted as a conference paper at ICCPS17
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Systems and Control (cs.SY)

Fri, 11 Aug 2017

[23]  arXiv:1708.03243 (cross-list from nlin.CD) [pdf, other]
Title: Summary of Topological Study of Chaotic CBC Mode of Operation
Comments: arXiv admin note: text overlap with arXiv:1605.02950, arXiv:1608.05838, arXiv:1601.08139
Subjects: Chaotic Dynamics (nlin.CD); Cryptography and Security (cs.CR)

Thu, 10 Aug 2017 (showing first 2 of 7 entries)

[24]  arXiv:1708.02921 [pdf, ps, other]
Title: Asymmetric Quantum Codes on Toric Surfaces
Authors: Johan P. Hansen
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Quantum Physics (quant-ph)
[25]  arXiv:1708.02888 [pdf, other]
Title: Multi-message Authentication over Noisy Channel with Secure Channel Codes
Comments: 15 Pages, 15figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[ total of 30 entries: 1-25 | 26-30 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)