We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2017

[ total of 161 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 151-161 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:1708.00157 [pdf, other]
Title: A Stable Coin with Pro-rated Rebasement and Price Manipulation Protection
Authors: Jose I. Orlicki
Comments: 9 pages, 4 figures, draft
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:1708.00319 [pdf]
Title: Privacy Protection Cache Policy on Hybrid Main Memory
Comments: 2 pages, 3 figures, IEEE Transactions on Very Large Scale Integration Systems. arXiv admin note: text overlap with arXiv:1707.02842
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3]  arXiv:1708.00562 [pdf]
Title: A Unique One-Time Password Table Sequence Pattern Authentication: Application to Bicol University Union of Federated Faculty Association, Inc. (BUUFFAI) eVoting System
Comments: Vol. 1, No. 1, pp. 1-10 this https URL
Journal-ref: International Journal of Computing Sciences Research (ISSN (print): 2546-0552)2017
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1708.00807 [pdf, other]
Title: Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning
Comments: 5 pages. {I.2.6}{Artificial Intelligence} ; {K.6.5}{Management of Computing and Information Systems}{Security and Protection}. arXiv admin note: substantial text overlap with arXiv:1706.01763
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[5]  arXiv:1708.00930 [pdf, other]
Title: Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks
Comments: Submitted to Journal of Visual Communication and Image Representation (first submission: March 20, 2017; second submission: August 2, 2017)
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[6]  arXiv:1708.00969 [pdf, other]
Title: Modeling the Propagation of Trojan Malware in Online Social Networks
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:1708.00979 [pdf, other]
Title: New Results on the DMC Capacity and Renyi's Divergence
Authors: Yi Janet Lu
Comments: Part of the material was presented at the 2nd International Workshop on Boolean Functions and their Applications (BFA), Sosltrand, Norway, July 3-8, 2017
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[8]  arXiv:1708.00991 [pdf, ps, other]
Title: Trust Implications of DDoS Protection in Online Elections
Comments: Published in E-Vote-ID 2017
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:1708.01023 [pdf, other]
Title: Collusion-Secure Watermarking for Sequential Data
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1708.01171 [pdf, other]
Title: Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Comments: Published in ACM CCS 2017, this is the full version with all appendices
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1708.01295 [pdf, other]
Title: On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1708.01302 [pdf]
Title: A solution for ARP spoofing: Layer-2 MAC and protocol filtering and arpserver
Authors: Yuksel Arslan
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:1708.01706 [pdf, other]
Title: Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:1708.01728 [pdf]
Title: Privileged Data within Digital Evidence
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:1708.01730 [pdf]
Title: Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:1708.01731 [pdf]
Title: Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:1708.01732 [pdf]
Title: Private Web Browser Forensics: A Case Study of the Epic Privacy Browser
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1708.01834 [pdf, other]
Title: Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[19]  arXiv:1708.01864 [pdf, other]
Title: Exploiting Latent Attack Semantics for Intelligent Malware Detection
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1708.01868 [pdf, ps, other]
Title: Concealing IMSI in 5G Network Using Identity Based Encryption
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1708.01884 [pdf, other]
Title: Differential Privacy By Sampling
Authors: Josh Joy, Mario Gerla
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:1708.02091 [pdf, other]
Title: MoPS: A Modular Protection Scheme for Long-Term Storage
Comments: Original Publication (in the same form): ASIACCS 2017
Journal-ref: ASIACCS 2017, pages 436-448
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:1708.02175 [pdf, other]
Title: Classification and Analysis of Communication Protection Policy Anomalies
Comments: Published on IEEE/ACM Transactions on Networking
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:1708.02380 [pdf, ps, other]
Title: Ghera: A Repository of Android App Vulnerability Benchmarks
Comments: 10 pages. Accepted at PROMISE'17
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[25]  arXiv:1708.02629 [pdf, other]
Title: Protecting Genomic Privacy by a Sequence-Similarity Based Obfuscation Method
Comments: 5 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 161 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 151-161 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2208, contact, help  (Access key information)