CINXE.COM

Cryptography and Security Jun 2014

<!DOCTYPE html> <html lang="en"> <head> <title>Cryptography and Security Jun 2014</title> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="apple-touch-icon" sizes="180x180" href="/static/browse/0.3.4/images/icons/apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="/static/browse/0.3.4/images/icons/favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="/static/browse/0.3.4/images/icons/favicon-16x16.png"> <link rel="manifest" href="/static/browse/0.3.4/images/icons/site.webmanifest"> <link rel="mask-icon" href="/static/browse/0.3.4/images/icons/safari-pinned-tab.svg" color="#5bbad5"> <meta name="msapplication-TileColor" content="#da532c"> <meta name="theme-color" content="#ffffff"> <link rel="stylesheet" type="text/css" media="screen" href="/static/browse/0.3.4/css/arXiv.css?v=20241206" /> <link rel="stylesheet" type="text/css" media="print" href="/static/browse/0.3.4/css/arXiv-print.css?v=20200611" /> <link rel="stylesheet" type="text/css" media="screen" href="/static/browse/0.3.4/css/browse_search.css" /> <script language="javascript" src="/static/browse/0.3.4/js/accordion.js" /></script> <script src="/static/browse/0.3.4/js/mathjaxToggle.min.js" type="text/javascript"></script> <script type="text/javascript" language="javascript">mathjaxToggle();</script> </head> <body class="with-cu-identity"> <div class="flex-wrap-footer"> <header> <a href="#content" class="is-sr-only">Skip to main content</a> <!-- start desktop header --> <div class="columns is-vcentered is-hidden-mobile" id="cu-identity"> <div class="column" id="cu-logo"> <a href="https://www.cornell.edu/"><img src="/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg" alt="Cornell University" /></a> </div><div class="column" id="support-ack"> <span id="support-ack-url">We gratefully acknowledge support from the Simons Foundation, <a href="https://info.arxiv.org/about/ourmembers.html">member institutions</a>, and all contributors.</span> <a href="https://info.arxiv.org/about/donate.html" class="btn-header-donate">Donate</a> </div> </div> <div id="header" class="is-hidden-mobile"> <a aria-hidden="true" tabindex="-1" href="/IgnoreMe"></a> <div class="header-breadcrumbs"> <a href="/"><img src="/static/browse/0.3.4/images/arxiv-logo-one-color-white.svg" alt="arxiv logo" style="height:40px;"/></a> <span>&gt;</span> <a href="/list/cs.CR/recent">cs.CR</a> </div> <div class="search-block level-right"> <form class="level-item mini-search" method="GET" action="https://arxiv.org/search"> <div class="field has-addons"> <div class="control"> <input class="input is-small" type="text" name="query" placeholder="Search..." aria-label="Search term or terms" /> <p class="help"><a href="https://info.arxiv.org/help">Help</a> | <a href="https://arxiv.org/search/advanced">Advanced Search</a></p> </div> <div class="control"> <div class="select is-small"> <select name="searchtype" aria-label="Field to search"> <option value="all" selected="selected">All fields</option> <option value="title">Title</option> <option value="author">Author</option> <option value="abstract">Abstract</option> <option value="comments">Comments</option> <option value="journal_ref">Journal reference</option> <option value="acm_class">ACM classification</option> <option value="msc_class">MSC classification</option> <option value="report_num">Report number</option> <option value="paper_id">arXiv identifier</option> <option value="doi">DOI</option> <option value="orcid">ORCID</option> <option value="author_id">arXiv author ID</option> <option value="help">Help pages</option> <option value="full_text">Full text</option> </select> </div> </div> <input type="hidden" name="source" value="header"> <button class="button is-small is-cul-darker">Search</button> </div> </form> </div> </div><!-- /end desktop header --> <div class="mobile-header"> <div class="columns is-mobile"> <div class="column logo-arxiv"><a href="https://arxiv.org/"><img src="/static/browse/0.3.4/images/arxiv-logomark-small-white.svg" alt="arXiv logo" style="height:60px;" /></a></div> <div class="column logo-cornell"><a href="https://www.cornell.edu/"> <picture> <source media="(min-width: 501px)" srcset="/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg 400w" sizes="400w" /> <source srcset="/static/browse/0.3.4/images/icons/cu/cornell_seal_simple_black.svg 2x" /> <img src="/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg" alt="Cornell University Logo" /> </picture> </a></div> <div class="column nav" id="toggle-container" role="menubar"> <button class="toggle-control"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-white"><title>open search</title><path d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"/></svg></button> <div class="mobile-toggle-block toggle-target"> <form class="mobile-search-form" method="GET" action="https://arxiv.org/search"> <div class="field has-addons"> <input class="input" type="text" name="query" placeholder="Search..." aria-label="Search term or terms" /> <input type="hidden" name="source" value="header"> <input type="hidden" name="searchtype" value="all"> <button class="button">GO</button> </div> </form> </div> <button class="toggle-control"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512" class="icon filter-white" role="menu"><title>open navigation menu</title><path d="M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"/ ></svg></button> <div class="mobile-toggle-block toggle-target"> <nav class="mobile-menu" aria-labelledby="mobilemenulabel"> <h2 id="mobilemenulabel">quick links</h2> <ul> <li><a href="https://arxiv.org/login">Login</a></li> <li><a href="https://info.arxiv.org/help">Help Pages</a></li> <li><a href="https://info.arxiv.org/about">About</a></li> </ul> </nav> </div> </div> </div> </div><!-- /end mobile-header --> </header> <main> <div id="content"> <div id='content-inner'> <div id='dlpage'> <h1>Cryptography and Security</h1> <h2>Authors and titles for June 2014 </h2> <div class='paging'>Total of 54 entries : <span>1-50</span> <a href=/list/cs.CR/2014-06?skip=50&amp;show=50>51-54</a> </div> <div class='morefewer'>Showing up to 50 entries per page: <a href=/list/cs.CR/2014-06?skip=0&amp;show=25 rel="nofollow"> fewer</a> | <span style="color: #454545">more</span> | <a href=/list/cs.CR/2014-06?skip=0&amp;show=2000 rel="nofollow"> all</a> </div> <dl id='articles'> <dt> <a name='item1'>[1]</a> <a href ="/abs/1406.0090" title="Abstract" id="1406.0090"> arXiv:1406.0090 </a> [<a href="/pdf/1406.0090" title="Download PDF" id="pdf-1406.0090" aria-labelledby="pdf-1406.0090">pdf</a>, <a href="/format/1406.0090" title="Other formats" id="oth-1406.0090" aria-labelledby="oth-1406.0090">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Puri,+A">Arjun Puri</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kumar,+S">Sudesh Kumar</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 6 pages, 2 figures </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> International Journal of Computer Applications 92(1):1-6, April 2014 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item2'>[2]</a> <a href ="/abs/1406.0342" title="Abstract" id="1406.0342"> arXiv:1406.0342 </a> [<a href="/pdf/1406.0342" title="Download PDF" id="pdf-1406.0342" aria-labelledby="pdf-1406.0342">pdf</a>, <a href="/format/1406.0342" title="Other formats" id="oth-1406.0342" aria-labelledby="oth-1406.0342">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A faster method for computing Gama-Nguyen-Regev&#39;s extreme pruning coefficients </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Aono,+Y">Yoshinori Aono</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item3'>[3]</a> <a href ="/abs/1406.0373" title="Abstract" id="1406.0373"> arXiv:1406.0373 </a> [<a href="/pdf/1406.0373" title="Download PDF" id="pdf-1406.0373" aria-labelledby="pdf-1406.0373">pdf</a>, <a href="/format/1406.0373" title="Other formats" id="oth-1406.0373" aria-labelledby="oth-1406.0373">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Linear Programming Relaxations for Goldreich&#39;s Generators over Non-Binary Alphabets </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mori,+R">Ryuhei Mori</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Koshiba,+T">Takeshi Koshiba</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Watanabe,+O">Osamu Watanabe</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yamamoto,+M">Masaki Yamamoto</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 14 pages, 1 figure </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Computational Complexity (cs.CC); Information Theory (cs.IT) </div> </div> </dd> <dt> <a name='item4'>[4]</a> <a href ="/abs/1406.0866" title="Abstract" id="1406.0866"> arXiv:1406.0866 </a> [<a href="/pdf/1406.0866" title="Download PDF" id="pdf-1406.0866" aria-labelledby="pdf-1406.0866">pdf</a>, <a href="/format/1406.0866" title="Other formats" id="oth-1406.0866" aria-labelledby="oth-1406.0866">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Subspace Methods for Data Attack on State Estimation: A Data Driven Approach </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kim,+J">Jinsub Kim</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tong,+L">Lang Tong</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Thomas,+R+J">Robert J. Thomas</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 12 pages </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item5'>[5]</a> <a href ="/abs/1406.1033" title="Abstract" id="1406.1033"> arXiv:1406.1033 </a> [<a href="/pdf/1406.1033" title="Download PDF" id="pdf-1406.1033" aria-labelledby="pdf-1406.1033">pdf</a>, <a href="/format/1406.1033" title="Other formats" id="oth-1406.1033" aria-labelledby="oth-1406.1033">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Identity Management issues in Cloud Computing </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Saini,+S">Smita Saini</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mann,+D">Deep Mann</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 3 pages.&#34;Published with International Journal of Computer Trends and Technology (IJCTT)&#34; </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> IJCTT V9(8):414-416, March 2014 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item6'>[6]</a> <a href ="/abs/1406.1154" title="Abstract" id="1406.1154"> arXiv:1406.1154 </a> [<a href="/pdf/1406.1154" title="Download PDF" id="pdf-1406.1154" aria-labelledby="pdf-1406.1154">pdf</a>, <a href="/format/1406.1154" title="Other formats" id="oth-1406.1154" aria-labelledby="oth-1406.1154">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tams,+B">Benjamin Tams</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item7'>[7]</a> <a href ="/abs/1406.1213" title="Abstract" id="1406.1213"> arXiv:1406.1213 </a> [<a href="/pdf/1406.1213" title="Download PDF" id="pdf-1406.1213" aria-labelledby="pdf-1406.1213">pdf</a>, <a href="/format/1406.1213" title="Other formats" id="oth-1406.1213" aria-labelledby="oth-1406.1213">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> On Covert Acoustical Mesh Networks in Air </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hanspach,+M">Michael Hanspach</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Goetz,+M">Michael Goetz</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 10 pages, updated version </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> Journal of Communications 8(11), Nov. 2013 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Networking and Internet Architecture (cs.NI); Sound (cs.SD) </div> </div> </dd> <dt> <a name='item8'>[8]</a> <a href ="/abs/1406.1543" title="Abstract" id="1406.1543"> arXiv:1406.1543 </a> [<a href="/pdf/1406.1543" title="Download PDF" id="pdf-1406.1543" aria-labelledby="pdf-1406.1543">pdf</a>, <a href="/format/1406.1543" title="Other formats" id="oth-1406.1543" aria-labelledby="oth-1406.1543">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Untappable key distribution system: a one-time-pad booster </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Barbosa,+G+A">Geraldo A. Barbosa</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=van+de+Graaf,+J">Jeroen van de Graaf</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 12 pages, 16 figures </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Quantum Physics (quant-ph) </div> </div> </dd> <dt> <a name='item9'>[9]</a> <a href ="/abs/1406.1795" title="Abstract" id="1406.1795"> arXiv:1406.1795 </a> [<a href="/pdf/1406.1795" title="Download PDF" id="pdf-1406.1795" aria-labelledby="pdf-1406.1795">pdf</a>, <a href="/format/1406.1795" title="Other formats" id="oth-1406.1795" aria-labelledby="oth-1406.1795">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Fatema,+N">Nusrat Fatema</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Brad,+R">Remus Brad</a></div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> International Journal of Computer Networking and Communication, vol. 2 (2), pp. 1-9, May 2014 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Computers and Society (cs.CY) </div> </div> </dd> <dt> <a name='item10'>[10]</a> <a href ="/abs/1406.1823" title="Abstract" id="1406.1823"> arXiv:1406.1823 </a> [<a href="/pdf/1406.1823" title="Download PDF" id="pdf-1406.1823" aria-labelledby="pdf-1406.1823">pdf</a>, <a href="/format/1406.1823" title="Other formats" id="oth-1406.1823" aria-labelledby="oth-1406.1823">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Multi-user protocols with access control for computational privacy in public clouds </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Dara,+S">Sashank Dara</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 6 pages </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item11'>[11]</a> <a href ="/abs/1406.2146" title="Abstract" id="1406.2146"> arXiv:1406.2146 </a> [<a href="/pdf/1406.2146" title="Download PDF" id="pdf-1406.2146" aria-labelledby="pdf-1406.2146">pdf</a>, <a href="/format/1406.2146" title="Other formats" id="oth-1406.2146" aria-labelledby="oth-1406.2146">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Digital Watermarking Techniques in Spatial and Frequency Domain </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sarkar,+T">Tanmoy Sarkar</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sanyal,+S">Sugata Sanyal</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 5 pages, 5 figures </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item12'>[12]</a> <a href ="/abs/1406.2285" title="Abstract" id="1406.2285"> arXiv:1406.2285 </a> [<a href="/pdf/1406.2285" title="Download PDF" id="pdf-1406.2285" aria-labelledby="pdf-1406.2285">pdf</a>, <a href="/format/1406.2285" title="Other formats" id="oth-1406.2285" aria-labelledby="oth-1406.2285">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A Piggybank Protocol for Quantum Cryptography </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chodisetti,+N">Navya Chodisetti</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 6 pages, 2 figures, 1 table </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item13'>[13]</a> <a href ="/abs/1406.2568" title="Abstract" id="1406.2568"> arXiv:1406.2568 </a> [<a href="/pdf/1406.2568" title="Download PDF" id="pdf-1406.2568" aria-labelledby="pdf-1406.2568">pdf</a>, <a href="/format/1406.2568" title="Other formats" id="oth-1406.2568" aria-labelledby="oth-1406.2568">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Quantifying the Utility-Privacy Tradeoff in the Smart Grid </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Dong,+R">Roy Dong</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=C%C3%A1rdenas,+A+A">Alvaro A. C谩rdenas</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ratliff,+L+J">Lillian J. Ratliff</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ohlsson,+H">Henrik Ohlsson</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sastry,+S+S">S. Shankar Sastry</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item14'>[14]</a> <a href ="/abs/1406.2901" title="Abstract" id="1406.2901"> arXiv:1406.2901 </a> [<a href="/pdf/1406.2901" title="Download PDF" id="pdf-1406.2901" aria-labelledby="pdf-1406.2901">pdf</a>, <a href="/format/1406.2901" title="Other formats" id="oth-1406.2901" aria-labelledby="oth-1406.2901">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A Pattern-based Survey and Categorization of Network Covert Channel Techniques </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wendzel,+S">Steffen Wendzel</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zander,+S">Sebastian Zander</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Fechner,+B">Bernhard Fechner</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Herdin,+C">Christian Herdin</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 27 pages, 4 figures, 3 tables, accepted for publication in ACM Computing Surveys (CSUR, submitted on Dec-2013, accepted in Oct-2014). The final publication will be available via ACM </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> ACM Computing Surveys, Vol. 47(3), ACM, 2015 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item15'>[15]</a> <a href ="/abs/1406.2930" title="Abstract" id="1406.2930"> arXiv:1406.2930 </a> [<a href="/pdf/1406.2930" title="Download PDF" id="pdf-1406.2930" aria-labelledby="pdf-1406.2930">pdf</a>, <a href="/format/1406.2930" title="Other formats" id="oth-1406.2930" aria-labelledby="oth-1406.2930">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Improved Secure Address Resolution Protocol </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Samvedi,+A">Abhishek Samvedi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Owlak,+S">Sparsh Owlak</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chaurasia,+V+K">Vijay Kumar Chaurasia</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 10 pages, 15 figures, paper selected in fifth international conference of communications security and information assurance 2014 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item16'>[16]</a> <a href ="/abs/1406.3074" title="Abstract" id="1406.3074"> arXiv:1406.3074 </a> [<a href="/pdf/1406.3074" title="Download PDF" id="pdf-1406.3074" aria-labelledby="pdf-1406.3074">pdf</a>, <a href="/format/1406.3074" title="Other formats" id="oth-1406.3074" aria-labelledby="oth-1406.3074">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A New Result on the Random Residue Sequence Algorithm </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kotagiri,+V+S">Vamsi Sashank Kotagiri</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 6 pages,2 tables </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item17'>[17]</a> <a href ="/abs/1406.3240" title="Abstract" id="1406.3240"> arXiv:1406.3240 </a> [<a href="/pdf/1406.3240" title="Download PDF" id="pdf-1406.3240" aria-labelledby="pdf-1406.3240">pdf</a>, <a href="/format/1406.3240" title="Other formats" id="oth-1406.3240" aria-labelledby="oth-1406.3240">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yi,+W">Wentan Yi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chen,+S">Shaozhen Chen</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wei,+K">Kuanyang Wei</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> arXiv admin note: text overlap with <a href="https://arxiv.org/abs/1404.6100" data-arxiv-id="1404.6100" class="link-https">arXiv:1404.6100</a> </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item18'>[18]</a> <a href ="/abs/1406.3583" title="Abstract" id="1406.3583"> arXiv:1406.3583 </a> [<a href="/pdf/1406.3583" title="Download PDF" id="pdf-1406.3583" aria-labelledby="pdf-1406.3583">pdf</a>, <a href="/format/1406.3583" title="Other formats" id="oth-1406.3583" aria-labelledby="oth-1406.3583">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Representing Network Trust and Using It to Improve Anonymous Communication </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jaggard,+A+D">Aaron D. Jaggard</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Johnson,+A">Aaron Johnson</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Syverson,+P">Paul Syverson</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Feigenbaum,+J">Joan Feigenbaum</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 24 pages; talk to be presented at HotPETs 2014 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item19'>[19]</a> <a href ="/abs/1406.3687" title="Abstract" id="1406.3687"> arXiv:1406.3687 </a> [<a href="/pdf/1406.3687" title="Download PDF" id="pdf-1406.3687" aria-labelledby="pdf-1406.3687">pdf</a>, <a href="/format/1406.3687" title="Other formats" id="oth-1406.3687" aria-labelledby="oth-1406.3687">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gupta,+N">Neha Gupta</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Aggarwal,+A">Anupama Aggarwal</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kumaraguru,+P">Ponnurangam Kumaraguru</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> arXiv admin note: substantial text overlap with <a href="https://arxiv.org/abs/1405.1511" data-arxiv-id="1405.1511" class="link-https">arXiv:1405.1511</a> </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item20'>[20]</a> <a href ="/abs/1406.3943" title="Abstract" id="1406.3943"> arXiv:1406.3943 </a> [<a href="/pdf/1406.3943" title="Download PDF" id="pdf-1406.3943" aria-labelledby="pdf-1406.3943">pdf</a>, <a href="/format/1406.3943" title="Other formats" id="oth-1406.3943" aria-labelledby="oth-1406.3943">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Cryptanalysis of Cryptanalysis and Improvement of Yan et al Biometric-Based Authentication Scheme for TMIS </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sarvabhatla,+M">Mrudula Sarvabhatla</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=M.Giri">M.Giri</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Vorugunti,+C+S">Chandra Sekhar Vorugunti</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> arXiv admin note: text overlap with <a href="https://arxiv.org/abs/1309.4944" data-arxiv-id="1309.4944" class="link-https">arXiv:1309.4944</a> by other authors </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item21'>[21]</a> <a href ="/abs/1406.4053" title="Abstract" id="1406.4053"> arXiv:1406.4053 </a> [<a href="/pdf/1406.4053" title="Download PDF" id="pdf-1406.4053" aria-labelledby="pdf-1406.4053">pdf</a>, <a href="/format/1406.4053" title="Other formats" id="oth-1406.4053" aria-labelledby="oth-1406.4053">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Maheswaran,+J">John Maheswaran</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jackowitz,+D">Daniel Jackowitz</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wolinsky,+D+I">David Isaac Wolinsky</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wang,+L">Lining Wang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ford,+B">Bryan Ford</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 9 figures </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item22'>[22]</a> <a href ="/abs/1406.4285" title="Abstract" id="1406.4285"> arXiv:1406.4285 </a> [<a href="/pdf/1406.4285" title="Download PDF" id="pdf-1406.4285" aria-labelledby="pdf-1406.4285">pdf</a>, <a href="/format/1406.4285" title="Other formats" id="oth-1406.4285" aria-labelledby="oth-1406.4285">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> C-sanitized: a privacy model for document redaction and sanitization </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sanchez,+D">David Sanchez</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Batet,+M">Montserrat Batet</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> in Journal of the Association for Information Science and Technology, 2015 </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> Journal of the Association for Information Science and Technology, Volume 67, Issue 1 (2016) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item23'>[23]</a> <a href ="/abs/1406.4516" title="Abstract" id="1406.4516"> arXiv:1406.4516 </a> [<a href="/pdf/1406.4516" title="Download PDF" id="pdf-1406.4516" aria-labelledby="pdf-1406.4516">pdf</a>, <a href="/format/1406.4516" title="Other formats" id="oth-1406.4516" aria-labelledby="oth-1406.4516">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Classification of Attacks in Wireless Sensor Networks </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Messai,+M">Mohamed-Lamine Messai</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> International Congress on Telecommunication and Application 2014 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item24'>[24]</a> <a href ="/abs/1406.4681" title="Abstract" id="1406.4681"> arXiv:1406.4681 </a> [<a href="/pdf/1406.4681" title="Download PDF" id="pdf-1406.4681" aria-labelledby="pdf-1406.4681">pdf</a>, <a href="/format/1406.4681" title="Other formats" id="oth-1406.4681" aria-labelledby="oth-1406.4681">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Crypto multi tenant: an environment of secure computing using cloud sql </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kashyap,+P">Parul Kashyap</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Singh,+R">Rahul Singh</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 9 pages, 5 figures, IEEE journals, connferences 2009,2010; springer </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item25'>[25]</a> <a href ="/abs/1406.4748" title="Abstract" id="1406.4748"> arXiv:1406.4748 </a> [<a href="/pdf/1406.4748" title="Download PDF" id="pdf-1406.4748" aria-labelledby="pdf-1406.4748">pdf</a>, <a href="/format/1406.4748" title="Other formats" id="oth-1406.4748" aria-labelledby="oth-1406.4748">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A New Advanced User Authentication and Confidentiality Security Service </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Majumder,+S">Sanjay Majumder</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chakraborty,+S">Sanjay Chakraborty</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Das,+S">Suman Das</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item26'>[26]</a> <a href ="/abs/1406.4844" title="Abstract" id="1406.4844"> arXiv:1406.4844 </a> [<a href="/pdf/1406.4844" title="Download PDF" id="pdf-1406.4844" aria-labelledby="pdf-1406.4844">pdf</a>, <a href="/format/1406.4844" title="Other formats" id="oth-1406.4844" aria-labelledby="oth-1406.4844">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Beam-forming for Secure Communication in Amplify-and-Forward Networks: An SNR based approach </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sarma,+S">Siddhartha Sarma</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Agnihotri,+S">Samar Agnihotri</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kuri,+J">Joy Kuri</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item27'>[27]</a> <a href ="/abs/1406.4988" title="Abstract" id="1406.4988"> arXiv:1406.4988 </a> [<a href="/pdf/1406.4988" title="Download PDF" id="pdf-1406.4988" aria-labelledby="pdf-1406.4988">pdf</a>, <a href="/format/1406.4988" title="Other formats" id="oth-1406.4988" aria-labelledby="oth-1406.4988">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Path Conditions and Principal Matching: A New Approach to Access Control </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Crampton,+J">Jason Crampton</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sellwood,+J">James Sellwood</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> Accepted for publication at SACMAT 2014 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item28'>[28]</a> <a href ="/abs/1406.5440" title="Abstract" id="1406.5440"> arXiv:1406.5440 </a> [<a href="/pdf/1406.5440" title="Download PDF" id="pdf-1406.5440" aria-labelledby="pdf-1406.5440">pdf</a>, <a href="/format/1406.5440" title="Other formats" id="oth-1406.5440" aria-labelledby="oth-1406.5440">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Operational Distributed Regulation for Bitcoin </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Dinesh">Dinesh</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Erlich">Erlich</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gilfoyle">Gilfoyle</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jared">Jared</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Richard">Richard</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Pouwelse,+J">Johan Pouwelse</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 9 pages report by students who desire to remain anonymous </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC) </div> </div> </dd> <dt> <a name='item29'>[29]</a> <a href ="/abs/1406.5569" title="Abstract" id="1406.5569"> arXiv:1406.5569 </a> [<a href="/pdf/1406.5569" title="Download PDF" id="pdf-1406.5569" aria-labelledby="pdf-1406.5569">pdf</a>, <a href="/format/1406.5569" title="Other formats" id="oth-1406.5569" aria-labelledby="oth-1406.5569">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> On the Reverse Engineering of the Citadel Botnet </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Rahimian,+A">Ashkan Rahimian</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ziarati,+R">Raha Ziarati</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Preda,+S">Stere Preda</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Debbabi,+M">Mourad Debbabi</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 10 pages, 17 figures. This is an updated / edited version of a paper appeared in FPS 2013 </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> LNCS 8352, 2014, pp 408-425 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Networking and Internet Architecture (cs.NI); Operating Systems (cs.OS); Software Engineering (cs.SE) </div> </div> </dd> <dt> <a name='item30'>[30]</a> <a href ="/abs/1406.5596" title="Abstract" id="1406.5596"> arXiv:1406.5596 </a> [<a href="/pdf/1406.5596" title="Download PDF" id="pdf-1406.5596" aria-labelledby="pdf-1406.5596">pdf</a>, <a href="/format/1406.5596" title="Other formats" id="oth-1406.5596" aria-labelledby="oth-1406.5596">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> An Epitome of Multi Secret Sharing Schemes for General Access Structure </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Binu,+V+P">V P Binu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=A">A Sreekumar</a></div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> International Journal of Information Processing, 8(2), 13-28, 2014 ISSN : 0973-8215 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item31'>[31]</a> <a href ="/abs/1406.5694" title="Abstract" id="1406.5694"> arXiv:1406.5694 </a> [<a href="/pdf/1406.5694" title="Download PDF" id="pdf-1406.5694" aria-labelledby="pdf-1406.5694">pdf</a>, <a href="/format/1406.5694" title="Other formats" id="oth-1406.5694" aria-labelledby="oth-1406.5694">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Cryptocurrencies without Proof of Work </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Bentov,+I">Iddo Bentov</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gabizon,+A">Ariel Gabizon</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mizrahi,+A">Alex Mizrahi</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item32'>[32]</a> <a href ="/abs/1406.5720" title="Abstract" id="1406.5720"> arXiv:1406.5720 </a> [<a href="/pdf/1406.5720" title="Download PDF" id="pdf-1406.5720" aria-labelledby="pdf-1406.5720">pdf</a>, <a href="/format/1406.5720" title="Other formats" id="oth-1406.5720" aria-labelledby="oth-1406.5720">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Publicly Verifiable Outsourced Computation with a Key Distribution Centre </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Alderman,+J">James Alderman</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Cid,+C">Carlos Cid</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Crampton,+J">Jason Crampton</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Janson,+C">Christian Janson</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> Conference version </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item33'>[33]</a> <a href ="/abs/1406.5751" title="Abstract" id="1406.5751"> arXiv:1406.5751 </a> [<a href="/pdf/1406.5751" title="Download PDF" id="pdf-1406.5751" aria-labelledby="pdf-1406.5751">pdf</a>, <a href="/format/1406.5751" title="Other formats" id="oth-1406.5751" aria-labelledby="oth-1406.5751">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Computing on Masked Data: a High Performance Method for Improving Big Data Veracity </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kepner,+J">Jeremy Kepner</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gadepally,+V">Vijay Gadepally</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Michaleas,+P">Pete Michaleas</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Schear,+N">Nabil Schear</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Varia,+M">Mayank Varia</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yerukhimovich,+A">Arkady Yerukhimovich</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Cunningham,+R+K">Robert K. Cunningham</a> (MIT)</div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> to appear in IEEE High Performance Extreme Computing 2014 (<a href="http://ieee-hpec.org" rel="external noopener nofollow" class="link-external link-http">this http URL</a>) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Instrumentation and Methods for Astrophysics (astro-ph.IM); Databases (cs.DB); Information Retrieval (cs.IR) </div> </div> </dd> <dt> <a name='item34'>[34]</a> <a href ="/abs/1406.6046" title="Abstract" id="1406.6046"> arXiv:1406.6046 </a> [<a href="/pdf/1406.6046" title="Download PDF" id="pdf-1406.6046" aria-labelledby="pdf-1406.6046">pdf</a>, <a href="/format/1406.6046" title="Other formats" id="oth-1406.6046" aria-labelledby="oth-1406.6046">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Hybrid Epidemics - A Case Study on Computer Worm Conficker </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhang,+C">Changwang Zhang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhou,+S">Shi Zhou</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chain,+B+M">Benjamin M. Chain</a></div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> PLoS ONE. 2015 May 15;10(5):e0127478 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI) </div> </div> </dd> <dt> <a name='item35'>[35]</a> <a href ="/abs/1406.6221" title="Abstract" id="1406.6221"> arXiv:1406.6221 </a> [<a href="/pdf/1406.6221" title="Download PDF" id="pdf-1406.6221" aria-labelledby="pdf-1406.6221">pdf</a>, <a href="/format/1406.6221" title="Other formats" id="oth-1406.6221" aria-labelledby="oth-1406.6221">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Masram,+R">Ranjeet Masram</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Shahare,+V">Vivek Shahare</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Abraham,+J">Jibi Abraham</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Moona,+R">Rajni Moona</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sinha,+P">Pradeep Sinha</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sunder,+G">Gaur Sunder</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Bendale,+P">Prashant Bendale</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Pophalkar,+S">Sayali Pophalkar</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 8 pages, 4 figures, Fifth International Conference on Communications Security &amp; Information Assurance (CSIA 2014) May 24~25, 2014, Delhi, India </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item36'>[36]</a> <a href ="/abs/1406.6647" title="Abstract" id="1406.6647"> arXiv:1406.6647 </a> [<a href="/pdf/1406.6647" title="Download PDF" id="pdf-1406.6647" aria-labelledby="pdf-1406.6647">pdf</a>, <a href="/format/1406.6647" title="Other formats" id="oth-1406.6647" aria-labelledby="oth-1406.6647">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Extract Secrets from Wireless Channel: A New Shape-based Approach </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Qiao,+Y">Yue Qiao</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kannan">Kannan Srinivasan</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Arora,+A">Anish Arora</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Information Theory (cs.IT) </div> </div> </dd> <dt> <a name='item37'>[37]</a> <a href ="/abs/1406.6854" title="Abstract" id="1406.6854"> arXiv:1406.6854 </a> [<a href="/pdf/1406.6854" title="Download PDF" id="pdf-1406.6854" aria-labelledby="pdf-1406.6854">pdf</a>, <a href="/format/1406.6854" title="Other formats" id="oth-1406.6854" aria-labelledby="oth-1406.6854">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A Fully Automated Latent Fingerprint Matcher with Embedded Self-learning Segmentation Module </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Xu,+J">Jinwei Xu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hu,+J">Jiankun Hu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jia,+X">Xiuping Jia</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Computer Vision and Pattern Recognition (cs.CV) </div> </div> </dd> <dt> <a name='item38'>[38]</a> <a href ="/abs/1406.7061" title="Abstract" id="1406.7061"> arXiv:1406.7061 </a> [<a href="/pdf/1406.7061" title="Download PDF" id="pdf-1406.7061" aria-labelledby="pdf-1406.7061">pdf</a>, <a href="/format/1406.7061" title="Other formats" id="oth-1406.7061" aria-labelledby="oth-1406.7061">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sharma,+A">Ashu Sharma</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sahay,+S">S.K. Sahay</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 5 Pages </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> International Journal of Computer Applications, 2014, Vol. 90, No. 2, p. 7 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item39'>[39]</a> <a href ="/abs/1406.7078" title="Abstract" id="1406.7078"> arXiv:1406.7078 </a> [<a href="/pdf/1406.7078" title="Download PDF" id="pdf-1406.7078" aria-labelledby="pdf-1406.7078">pdf</a>, <a href="/format/1406.7078" title="Other formats" id="oth-1406.7078" aria-labelledby="oth-1406.7078">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Close to Uniform Prime Number Generation With Fewer Random Bits </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Fouque,+P">Pierre-Alain Fouque</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tibouchi,+M">Mehdi Tibouchi</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> Full version of ICALP 2014 paper. Alternate version of IACR ePrint Report 2011/481 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Number Theory (math.NT) </div> </div> </dd> <dt> <a name='item40'>[40]</a> <a href ="/abs/1406.7377" title="Abstract" id="1406.7377"> arXiv:1406.7377 </a> [<a href="/pdf/1406.7377" title="Download PDF" id="pdf-1406.7377" aria-labelledby="pdf-1406.7377">pdf</a>, <a href="/format/1406.7377" title="Other formats" id="oth-1406.7377" aria-labelledby="oth-1406.7377">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A New Approach for Finding Cloned Profiles in Online Social Networks </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kharaji,+M+Y">Morteza Yousefi Kharaji</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Rizi,+F+S">Fatemeh Salehi Rizi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Khayyambashi,+M+R">Mohammad Reza Khayyambashi</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Social and Information Networks (cs.SI) </div> </div> </dd> <dt> <a name='item41'>[41]</a> <a href ="/abs/1406.0298" title="Abstract" id="1406.0298"> arXiv:1406.0298 </a> (cross-list from cs.NI) [<a href="/pdf/1406.0298" title="Download PDF" id="pdf-1406.0298" aria-labelledby="pdf-1406.0298">pdf</a>, <a href="/format/1406.0298" title="Other formats" id="oth-1406.0298" aria-labelledby="oth-1406.0298">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Analysis of Security Threats in Wireless Sensor Network </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Alam,+S">Sahabul Alam</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=De,+D">Debashis De</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 12 pages, 2 figures. arXiv admin note: substantial text overlap with <a href="https://arxiv.org/abs/0712.4169" data-arxiv-id="0712.4169" class="link-https">arXiv:0712.4169</a> by other authors </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Networking and Internet Architecture (cs.NI)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item42'>[42]</a> <a href ="/abs/1406.0589" title="Abstract" id="1406.0589"> arXiv:1406.0589 </a> (cross-list from quant-ph) [<a href="/pdf/1406.0589" title="Download PDF" id="pdf-1406.0589" aria-labelledby="pdf-1406.0589">pdf</a>, <a href="/format/1406.0589" title="Other formats" id="oth-1406.0589" aria-labelledby="oth-1406.0589">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Post-processing of the oblivious key in quantum private queries </div> <div class='list-authors'><a href="https://arxiv.org/search/quant-ph?searchtype=author&amp;query=Gao,+F">Fei Gao</a>, <a href="https://arxiv.org/search/quant-ph?searchtype=author&amp;query=Liu,+B">Bin Liu</a>, <a href="https://arxiv.org/search/quant-ph?searchtype=author&amp;query=Huang,+W">Wei Huang</a>, <a href="https://arxiv.org/search/quant-ph?searchtype=author&amp;query=Wen,+Q">Qiao-Yan Wen</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 11 pages, 5 figures, 3 tables </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> Ieee Journal Of Selected Topics In Quantum Electronics, VOL. 21, NO. 3, 6600111, 2015 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Quantum Physics (quant-ph)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item43'>[43]</a> <a href ="/abs/1406.1049" title="Abstract" id="1406.1049"> arXiv:1406.1049 </a> (cross-list from cs.DM) [<a href="/pdf/1406.1049" title="Download PDF" id="pdf-1406.1049" aria-labelledby="pdf-1406.1049">pdf</a>, <a href="/format/1406.1049" title="Other formats" id="oth-1406.1049" aria-labelledby="oth-1406.1049">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Fourier Transforms and Bent Functions on Finite Abelian Group-Acted Sets </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Fan,+Y">Yun Fan</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Xu,+B">Bangteng Xu</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Discrete Mathematics (cs.DM)</span>; Cryptography and Security (cs.CR); Representation Theory (math.RT) </div> </div> </dd> <dt> <a name='item44'>[44]</a> <a href ="/abs/1406.2041" title="Abstract" id="1406.2041"> arXiv:1406.2041 </a> (cross-list from cs.SE) [<a href="/pdf/1406.2041" title="Download PDF" id="pdf-1406.2041" aria-labelledby="pdf-1406.2041">pdf</a>, <a href="/format/1406.2041" title="Other formats" id="oth-1406.2041" aria-labelledby="oth-1406.2041">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Platform-Centric Android Monitoring---Modular and Efficient </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kuester,+J">Jan-Christoph Kuester</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Bauer,+A">Andreas Bauer</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Software Engineering (cs.SE)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item45'>[45]</a> <a href ="/abs/1406.2456" title="Abstract" id="1406.2456"> arXiv:1406.2456 </a> (cross-list from quant-ph) [<a href="/pdf/1406.2456" title="Download PDF" id="pdf-1406.2456" aria-labelledby="pdf-1406.2456">pdf</a>, <a href="/format/1406.2456" title="Other formats" id="oth-1406.2456" aria-labelledby="oth-1406.2456">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Limitations on information theoretically secure quantum homomorphic encryption </div> <div class='list-authors'><a href="https://arxiv.org/search/quant-ph?searchtype=author&amp;query=Yu,+L">Li Yu</a>, <a href="https://arxiv.org/search/quant-ph?searchtype=author&amp;query=Perez-Delgado,+C+A">Carlos A. Perez-Delgado</a>, <a href="https://arxiv.org/search/quant-ph?searchtype=author&amp;query=Fitzsimons,+J+F">Joseph F. Fitzsimons</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 4 pages, 1 figure </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> Phys. Rev. A 90, 050303 (2014) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Quantum Physics (quant-ph)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item46'>[46]</a> <a href ="/abs/1406.2519" title="Abstract" id="1406.2519"> arXiv:1406.2519 </a> (cross-list from cs.MM) [<a href="/pdf/1406.2519" title="Download PDF" id="pdf-1406.2519" aria-labelledby="pdf-1406.2519">pdf</a>, <a href="/format/1406.2519" title="Other formats" id="oth-1406.2519" aria-labelledby="oth-1406.2519">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> On Importance of Steganographic Cost For Network Steganography </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mazurczyk,+W">Wojciech Mazurczyk</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wendzel,+S">Steffen Wendzel</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Villares,+I+A">Ignacio Azagra Villares</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Szczypiorski,+K">Krzysztof Szczypiorski</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 15 pages, 14 figures, 3 tables </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Multimedia (cs.MM)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item47'>[47]</a> <a href ="/abs/1406.2791" title="Abstract" id="1406.2791"> arXiv:1406.2791 </a> (cross-list from cs.SE) [<a href="/pdf/1406.2791" title="Download PDF" id="pdf-1406.2791" aria-labelledby="pdf-1406.2791">pdf</a>, <a href="/format/1406.2791" title="Other formats" id="oth-1406.2791" aria-labelledby="oth-1406.2791">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A new approach for formal behavioral modeling of protection services in antivirus systems </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Norouzi,+M">Monire Norouzi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Parsa,+S">Saeed Parsa</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mahjur,+A">Ali Mahjur</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Software Engineering (cs.SE)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item48'>[48]</a> <a href ="/abs/1406.3002" title="Abstract" id="1406.3002"> arXiv:1406.3002 </a> (cross-list from cs.HC) [<a href="/pdf/1406.3002" title="Download PDF" id="pdf-1406.3002" aria-labelledby="pdf-1406.3002">pdf</a>, <a href="/format/1406.3002" title="Other formats" id="oth-1406.3002" aria-labelledby="oth-1406.3002">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> The Effect of Visual Noise on The Completion of Security Critical Tasks </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kaczmarek,+T">Tyler Kaczmarek</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kobsa,+A">Alfed Kobsa</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sy,+R">Robert Sy</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tsudik,+G">Gene Tsudik</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 10 pages, 5 figures </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Human-Computer Interaction (cs.HC)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item49'>[49]</a> <a href ="/abs/1406.3103" title="Abstract" id="1406.3103"> arXiv:1406.3103 </a> (cross-list from cs.IT) [<a href="/pdf/1406.3103" title="Download PDF" id="pdf-1406.3103" aria-labelledby="pdf-1406.3103">pdf</a>, <a href="/format/1406.3103" title="Other formats" id="oth-1406.3103" aria-labelledby="oth-1406.3103">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Deception with Side Information in Biometric Authentication Systems </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kang,+W">Wei Kang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Cao,+D">Daming Cao</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Liu,+N">Nan Liu</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> Submitted to IEEE Transactions on Information Theory </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Information Theory (cs.IT)</span>; Cryptography and Security (cs.CR) </div> </div> </dd> <dt> <a name='item50'>[50]</a> <a href ="/abs/1406.3110" title="Abstract" id="1406.3110"> arXiv:1406.3110 </a> (cross-list from cs.DL) [<a href="/pdf/1406.3110" title="Download PDF" id="pdf-1406.3110" aria-labelledby="pdf-1406.3110">pdf</a>, <a href="/format/1406.3110" title="Other formats" id="oth-1406.3110" aria-labelledby="oth-1406.3110">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Reaction to New Security Threat Class </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Elovici,+Y">Yuval Elovici</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Rokach,+L">Lior Rokach</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Digital Libraries (cs.DL)</span>; Cryptography and Security (cs.CR); Computers and Society (cs.CY) </div> </div> </dd> </dl> <div class='paging'>Total of 54 entries : <span>1-50</span> <a href=/list/cs.CR/2014-06?skip=50&amp;show=50>51-54</a> </div> <div class='morefewer'>Showing up to 50 entries per page: <a href=/list/cs.CR/2014-06?skip=0&amp;show=25 rel="nofollow"> fewer</a> | <span style="color: #454545">more</span> | <a href=/list/cs.CR/2014-06?skip=0&amp;show=2000 rel="nofollow"> all</a> </div> </div> </div> </div> </main> <footer style="clear: both;"> <div class="columns is-desktop" role="navigation" aria-label="Secondary" style="margin: -0.75em -0.75em 0.75em -0.75em"> <!-- Macro-Column 1 --> <div class="column" style="padding: 0;"> <div class="columns"> <div class="column"> <ul style="list-style: none; line-height: 2;"> <li><a href="https://info.arxiv.org/about">About</a></li> <li><a href="https://info.arxiv.org/help">Help</a></li> </ul> </div> <div class="column"> <ul style="list-style: none; line-height: 2;"> <li> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-black" role="presentation"><title>contact arXiv</title><desc>Click here to contact arXiv</desc><path d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"/></svg> <a href="https://info.arxiv.org/help/contact.html"> Contact</a> </li> <li> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-black" role="presentation"><title>subscribe to arXiv mailings</title><desc>Click here to subscribe</desc><path d="M476 3.2L12.5 270.6c-18.1 10.4-15.8 35.6 2.2 43.2L121 358.4l287.3-253.2c5.5-4.9 13.3 2.6 8.6 8.3L176 407v80.5c0 23.6 28.5 32.9 42.5 15.8L282 426l124.6 52.2c14.2 6 30.4-2.9 33-18.2l72-432C515 7.8 493.3-6.8 476 3.2z"/></svg> <a href="https://info.arxiv.org/help/subscribe"> Subscribe</a> </li> </ul> </div> </div> </div> <!-- End Macro-Column 1 --> <!-- Macro-Column 2 --> <div class="column" style="padding: 0;"> <div class="columns"> <div class="column"> <ul style="list-style: none; line-height: 2;"> <li><a href="https://info.arxiv.org/help/license/index.html">Copyright</a></li> <li><a href="https://info.arxiv.org/help/policies/privacy_policy.html">Privacy Policy</a></li> </ul> </div> <div class="column sorry-app-links"> <ul style="list-style: none; line-height: 2;"> <li><a href="https://info.arxiv.org/help/web_accessibility.html">Web Accessibility Assistance</a></li> <li> <p class="help"> <a class="a11y-main-link" href="https://status.arxiv.org" target="_blank">arXiv Operational Status <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 512" class="icon filter-dark_grey" role="presentation"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"/></svg></a><br> Get status notifications via <a class="is-link" href="https://subscribe.sorryapp.com/24846f03/email/new" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-black" role="presentation"><path d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"/></svg>email</a> or <a class="is-link" href="https://subscribe.sorryapp.com/24846f03/slack/new" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512" class="icon filter-black" role="presentation"><path d="M94.12 315.1c0 25.9-21.16 47.06-47.06 47.06S0 341 0 315.1c0-25.9 21.16-47.06 47.06-47.06h47.06v47.06zm23.72 0c0-25.9 21.16-47.06 47.06-47.06s47.06 21.16 47.06 47.06v117.84c0 25.9-21.16 47.06-47.06 47.06s-47.06-21.16-47.06-47.06V315.1zm47.06-188.98c-25.9 0-47.06-21.16-47.06-47.06S139 32 164.9 32s47.06 21.16 47.06 47.06v47.06H164.9zm0 23.72c25.9 0 47.06 21.16 47.06 47.06s-21.16 47.06-47.06 47.06H47.06C21.16 243.96 0 222.8 0 196.9s21.16-47.06 47.06-47.06H164.9zm188.98 47.06c0-25.9 21.16-47.06 47.06-47.06 25.9 0 47.06 21.16 47.06 47.06s-21.16 47.06-47.06 47.06h-47.06V196.9zm-23.72 0c0 25.9-21.16 47.06-47.06 47.06-25.9 0-47.06-21.16-47.06-47.06V79.06c0-25.9 21.16-47.06 47.06-47.06 25.9 0 47.06 21.16 47.06 47.06V196.9zM283.1 385.88c25.9 0 47.06 21.16 47.06 47.06 0 25.9-21.16 47.06-47.06 47.06-25.9 0-47.06-21.16-47.06-47.06v-47.06h47.06zm0-23.72c-25.9 0-47.06-21.16-47.06-47.06 0-25.9 21.16-47.06 47.06-47.06h117.84c25.9 0 47.06 21.16 47.06 47.06 0 25.9-21.16 47.06-47.06 47.06H283.1z"/></svg>slack</a> </p> </li> </ul> </div> </div> </div> <!-- end MetaColumn 2 --> <!-- End Macro-Column 2 --> </div> </footer> </div> <script src="/static/base/1.0.1/js/member_acknowledgement.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10