We gratefully acknowledge support from
the Simons Foundation
and member institutions

Cryptography and Security

Authors and titles for recent submissions

[ total of 52 entries: 1-25 | 26-50 | 51-52 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 18 May 2018

[1]  arXiv:1805.06786 [pdf, other]
Title: Betting on Blockchain Consensus with Fantomette
Comments: arXiv admin note: text overlap with arXiv:1801.07965
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:1805.06691 [pdf]
Title: Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-Enterprise
Comments: 4 pages
Journal-ref: T. Radivilova and H. A. Hassan, "Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise," (UkrMiCo), Odessa, 2017, pp. 1-4
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[3]  arXiv:1805.06620 [pdf]
Title: DroidMark: A Tool for Android Malware Detection using Taint Analysis and Bayesian Network
Comments: 5 Pages, Journal
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1805.06589 [pdf, other]
Title: Supersingular Isogeny Oblivious Transfer
Comments: 26 pages, 4 figures, Submitted
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:1805.06541 [pdf, other]
Title: Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version)
Comments: Published version appearing in IEEE TrustCom-18. This version contains more details on mathematics and data collection
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1805.06768 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum-enhanced Logic-based Blochchain I: Quantum Honest-success Byzantine Agreement and Qulogicoin
Comments: 15 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[7]  arXiv:1805.06680 (cross-list from cs.SI) [pdf]
Title: Detecting cyber threats through social network analysis: short survey
Journal-ref: Lyudmyla Kirichenko, Tamara Radivilova, Anders Carlsson. Detecting cyber threats through social network analysis: short survey. SocioEconomic Challenges, Volume 1, Issue 1, 2017. pp.20-34
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[8]  arXiv:1805.06542 (cross-list from cs.GT) [pdf, other]
Title: Dancing Pigs or Externalities? Measuring the Rationality of Security Decisions
Journal-ref: 2018 ACM Conference on Economics and Computation
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)

Thu, 17 May 2018

[9]  arXiv:1805.06411 [pdf, other]
Title: Airtnt: Fair Exchange Payment for Outsourced Secure Enclave Computations
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1805.06398 [pdf, other]
Title: Practical Decentralized Attribute-Based Delegation using Secure Name Systems
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1805.06351 [pdf, ps, other]
Title: A Note on "New techniques for noninteractive zero-knowledge"
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1805.06253 [pdf, other]
Title: reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:1805.06227 [pdf, ps, other]
Title: On the Significance of Quiescent Protocols for Asynchronous Perfectly Secure Message Transmission
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:1805.06187 [pdf, ps, other]
Title: Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[15]  arXiv:1805.06158 [pdf, other]
Title: Investigating the Agility Bias in DNS Graph Mining
Comments: Proceedings of the 17th IEEE International Conference on Computer and Information Technology (CIT 2017), pp. 253--260, Helsinki, IEEE
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[16]  arXiv:1805.06104 [pdf, ps, other]
Title: Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17]  arXiv:1805.06070 [pdf, ps, other]
Title: A Survey of Intrusion Detection Systems Leveraging Host Data
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1805.05986 [pdf]
Title: Runtime Optimization of Identification Event in ECG Based Biometric Authentication
Comments: 11 Pages, 4 Figures, 1 Table
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:1805.06182 (cross-list from cs.IT) [pdf, ps, other]
Title: Covert Wireless Communications with Active Eavesdropper on AWGN Channels
Comments: 10 pages, 12 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)

Wed, 16 May 2018 (showing first 6 of 11 entries)

[20]  arXiv:1805.05934 [pdf, other]
Title: Towards a Design Philosophy for Interoperable Blockchain Systems
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1805.05887 [pdf, other]
Title: LUCON: Data Flow Control for Message-Based IoT Systems
Comments: data flow control, information flow control, trustcom, 11 pages
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[22]  arXiv:1805.05853 [pdf, other]
Title: IoT Security: An End-to-End View and Case Study
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:1805.05846 [pdf]
Title: Digitalized Responsive Logical Interface Application
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:1805.05844 [pdf, other]
Title: Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance
Comments: 9 Pages, 9 Figures, 4 Tables, 5 Algorithms, Conference
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:1805.05838 [pdf, other]
Title: Understanding and Controlling User Linkability in Decentralized Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Learning (cs.LG); Machine Learning (stat.ML)
[ total of 52 entries: 1-25 | 26-50 | 51-52 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)