cicyt UNIZAR

Cryptography and Security

Authors and titles for recent submissions

[ total of 32 entries: 1-25 | 26-32 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 20 Mar 2018

[1]  arXiv:1803.06975 [pdf, other]
Title: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
[2]  arXiv:1803.06772 [pdf, other]
Title: SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[3]  arXiv:1803.06762 [pdf, other]
Title: Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
[4]  arXiv:1803.06608 [pdf, other]
Title: Covert Communications Versus Physical Layer Security
Comments: 4 pages, 2 figures, one table
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:1803.06559 [pdf, other]
Title: Improving Bitcoin's Resilience to Churn
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1803.06494 [pdf, other]
Title: Attack Trees in Isabelle -- CTL semantics, correctness and completeness
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)

Mon, 19 Mar 2018

[7]  arXiv:1803.06153 [pdf]
Title: A closer look on Intrusion Detection System for web applications
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1803.05961 [pdf, other]
Title: Chiron: Privacy-preserving Machine Learning as a Service
Subjects: Cryptography and Security (cs.CR)

Fri, 16 Mar 2018

[9]  arXiv:1803.05871 [pdf, other]
Title: Distributed Data Vending on Blockchain
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
[10]  arXiv:1803.05606 [pdf, ps, other]
Title: Securely Solving the Distributed Graph Coloring Problem
Comments: 24 pages (including all the proofs)
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1803.05593 [pdf]
Title: Information Security in Health Care Centre Using Cryptography and Steganography
Comments: 13 pages, 10 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1803.05542 [pdf, ps, other]
Title: A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[13]  arXiv:1803.05529 [pdf, other]
Title: Machine learning-assisted virtual patching of web applications
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:1803.05787 (cross-list from cs.CV) [pdf, other]
Title: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples
Comments: 27th International Joint Conference on Artificial Intelligence (IJCAI-18)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)

Thu, 15 Mar 2018

[15]  arXiv:1803.05385 [pdf]
Title: Distributed Random Number Generation for the Needs of Public Governance
Authors: Angelin Lalev
Comments: Presented on the 13-th conference on Information Security (Securitatea Inform\c{t}ional\u{a} 2017), Kishinev, Moldova
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16]  arXiv:1803.05365 [pdf, ps, other]
Title: The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure
Authors: Chris J Mitchell
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:1803.05201 [pdf, other]
Title: OSINT Analysis of the TOR Foundation
Comments: 8 pages, 4 figures This paper has been presented at the 13th International Conference on Cyber Warfare and Security (ICCWS'2018), National Defense University, Washington DC, USA. March 8-9th, 2018 This second version is correcting English and a few typos
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1803.05090 [pdf]
Title: Secret Key Generation from Channel Noise with the Help of a Common Key
Authors: Tatsuya Tomaru
Comments: 17 pages, 6 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:1803.05039 [pdf]
Title: Android Inter-App Communication Threats, Solutions, and Challenges
Authors: Jice Wang, Hongqi Wu
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1803.05022 [pdf, other]
Title: Securing the Internet of Things: New Perspectives and Research Challenges
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1803.05004 [pdf, ps, other]
Title: A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
Comments: submitted for publication
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:1803.05003 [pdf, other]
Title: An algorithm for hiding and recovering data using matrices
Comments: 17 pages, 1 latex file, 3 fugures
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:1803.05289 (cross-list from cs.IT) [pdf, ps, other]
Title: On the Security of Some Compact Keys for McEliece Scheme
Authors: Elise Barelli
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[24]  arXiv:1803.05123 (cross-list from cs.LG) [pdf, ps, other]
Title: Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks
Comments: 15 pages, 12 figures
Subjects: Learning (cs.LG); Cryptography and Security (cs.CR)

Wed, 14 Mar 2018 (showing first 1 of 8 entries)

[25]  arXiv:1803.04880 [pdf, other]
Title: An Efficient Data Protection Architecture Based on Fragmentation and Encryption
Authors: Han Qiu
Subjects: Cryptography and Security (cs.CR)
[ total of 32 entries: 1-25 | 26-32 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)