We gratefully acknowledge support from
the Simons Foundation
and member institutions

Cryptography and Security

Authors and titles for recent submissions

[ total of 30 entries: 1-25 | 26-30 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 19 Jan 2018

[1]  arXiv:1801.05974 [pdf, ps, other]
Title: Privacy-preserving Data Splitting: A Combinatorial Approach
Comments: 22 pages, 5 tables, 1 figure
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:1801.05958 [pdf]
Title: On a Generic Security Game Model
Comments: 31 pages
Journal-ref: Shandilya, V. and Shiva, S. (2017) On a Generic Security Game Model. Int. J. Communications , Network and System Sciences , 10, 142-172
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[3]  arXiv:1801.05915 [pdf, ps, other]
Title: Security in Mobile Edge Caching with Reinforcement Learning
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1801.05863 [pdf]
Title: Integrating Remote Attestation with Transport Layer Security
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:1801.06171 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security
Comments: Submitted to IEEE Transactions on Information Theory, January 2018
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[6]  arXiv:1801.05926 (cross-list from cs.IT) [pdf, ps, other]
Title: The Utility Cost of Robust Privacy Guarantees
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)

Thu, 18 Jan 2018

[7]  arXiv:1801.05764 [pdf, other]
Title: M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1801.05659 [pdf, other]
Title: On Decoding Schemes for the MDPC-McEliece Cryptosystem
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:1801.05583 [pdf]
Title: Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1801.05507 [pdf, other]
Title: Gazelle: A Low Latency Framework for Secure Neural Network Inference
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1801.05459 [pdf]
Title: Considerations regarding security issues impact on systems availability
Comments: Paper accepted for 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2016) Proceedings, Ploiesti, Romania
Subjects: Cryptography and Security (cs.CR)

Wed, 17 Jan 2018

[12]  arXiv:1801.04961 [pdf, other]
Title: Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)

Tue, 16 Jan 2018 (showing first 13 of 14 entries)

[13]  arXiv:1801.04725 [pdf, other]
Title: Secure k-NN as a Service Over Encrypted Data in Multi-User Setting
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:1801.04703 [pdf, other]
Title: Attack Potential in Impact and Complexity
Journal-ref: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017)
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:1801.04609 [pdf, other]
Title: Tyche: Risk-Based Permissions for Smart Home Platforms
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:1801.04569 [pdf, other]
Title: Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Comments: Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[17]  arXiv:1801.04565 [pdf, ps, other]
Title: Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[18]  arXiv:1801.04473 [pdf, other]
Title: Channel Whispering: a Protocol for Physical Layer Group Key Generation. Application to IR-UWB through Deconvolution
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[19]  arXiv:1801.04416 [pdf, other]
Title: MOF-BC: A Memory Optimized and Flexible BlockChain for Large Scale Networks
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1801.04372 [pdf, other]
Title: SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
Comments: This is the extended technical report version of our SCLib paper accepted by ACM CODASPY 2018 (this http URL)
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1801.04775 (cross-list from cs.IT) [pdf, ps, other]
Title: Two High-performance Schemes of Transmit Antenna Selection for Secure Spatial Modulation
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[22]  arXiv:1801.04693 (cross-list from cs.LG) [pdf, other]
Title: Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks
Comments: Adversarial example attacks, Robust and Imperceptible, Human perceptual system, Neural Networks
Subjects: Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[23]  arXiv:1801.04668 (cross-list from cs.IT) [pdf, ps, other]
Title: The decoding failure probability of MDPC codes
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[24]  arXiv:1801.04598 (cross-list from quant-ph) [pdf, other]
Title: New Perspectives on Multi-Prover Interactive Proofs
Comments: 14 pages, 7 figures. Submitted to the STOC 2018 conference, Nov 2017
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[25]  arXiv:1801.04589 (cross-list from cs.AI) [pdf, other]
Title: Deep Reinforcement Fuzzing
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 30 entries: 1-25 | 26-30 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)