| 中文标题 | 作者 | 论文ID | 分类简称 | 发布时间 |
|---|---|---|---|---|
| 追踪基于环剩余类的$R_{q,0} \times R_q$-PLWE非分裂情况下的密码分析 | Iv''an Blanco-Chac''on and Ra''ul Dur''an-D''iaz and Rahinatou Yuh Njah Nchiwo and Beatriz Barbero-Lucas | 2209.11962 | cs.CR | 2023-07-18 |
| 未知领域:无电池物联网中的能量攻击 | Luca Mottola, Arslan Hameed, and Thiemo Voigt | 2304.08224 | cs.CR | 2023-07-18 |
| 恶意软件的财务和运营:基于数据的感染与受损访问价值链研究 | Juha Nurmi, Mikko Niemel"a, Billy Bob Brumley | 2306.15726 | cs.CR | 2023-07-18 |
| 评估和利用域名错误信息 | Blake Anderson and David McGrew | 2307.07610 | cs.CR | 2023-07-18 |
| 沙特阿拉伯对安全、隐私和使用人脸识别技术的态度 | Amani Mohammed Alqarni, Daniel Timko and Muhammad Lutfor Rahman | 2307.07671 | cs.CR | 2023-07-18 |
| 理解针对大学、学院和学校的网络威胁 | Harjinder Singh Lallie and Andrew Thompson and Elzbieta Titis and Paul Stephens | 2307.07755 | cs.CR | 2023-07-18 |
| 超级Go:基于概率的有向混合模糊测试 | Peihong Lin and Pengfei Wang and Xu Zhou and Wei Xie and Kai Lu and Gen Zhang | 2307.07815 | cs.CR | 2023-07-18 |
| 本地差分隐私计算中的知识获取作为隐私损失 | Mingen Pan | 2307.08159 | cs.CR | 2023-07-18 |
| 自编码器无线系统中的隐蔽通信 | Ali Mohammadi Teshnizi, Majid Ghaderi, Dennis Goeckel | 2307.08195 | cs.CR | 2023-07-18 |
| 通过身份验证证明降低对自动证书颁发机构的信任 | Zachary Newman | 2307.08201 | cs.CR | 2023-07-18 |
| 我们到达了吗?基于溯源的终点检测和响应工具的工业视角 | Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen | 2307.08349 | cs.CR | 2023-07-18 |
| 基于元数据的机器学习在安卓上的恶意软件检测 | Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | 2307.08547 | cs.CR | 2023-07-18 |
| G-Scan:用于智能合约中行级漏洞识别的图神经网络 | Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar | 2307.08549 | cs.CR | 2023-07-18 |
| TorMult:引入一种新型Tor带宽膨胀攻击 | Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala | 2307.08550 | cs.CR | 2023-07-18 |
| 基于MinRank问题和MPC-in-the-Head范式的数字签名方案:MIRA | Nicolas Aragon, Lo"ic Bidoux, Jes''us-Javier Chi-Dom''inguez, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain | 2307.08575 | cs.CR | 2023-07-18 |
| 基于威胁情报的方法论:将不确定性纳入网络风险分析并加强决策 | Martijn Dekker and Lampis Alevizos | 2302.13082 | cs.CR | 2023-07-17 |
| 联邦学习中的公平性和隐私保护:一项调查 | Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae | 2306.08402 | cs.CR | 2023-07-17 |
| 入侵检测误报率对分析员绩效影响的控制实验 | Lucas Layman and William Roden | 2307.07023 | cs.CR | 2023-07-17 |
| 软件保护研究中的评估方法学 | Patrick Kochberger, Sebastian Schrittwieser, Bart Coppens, Bjorn De Sutter | 2307.07300 | cs.CR | 2023-07-17 |
| TUSH-Key:硬件密钥上的可迁移用户秘密 | Aditya Mitra, Anisha Ghosh, Sibi Chakkaravarthy Sethuraman | 2307.07484 | cs.CR | 2023-07-17 |
| CageCoach:面向共享的可编辑分布式加密文件系统 | Jason Carpenter and Zhi-Li Zhang | 2301.04214 | cs.CR | 2023-07-14 |
| 组件认证的安全协议和数据模型(SPDM)的基准测试 | Renan C. A. Alves, Bruno C. Albertini, Marcos A. Simplicio Jr | 2307.06456 | cs.CR | 2023-07-14 |
| 迁移到后量子密码学:使用安全依赖分析的框架 | Khondokar Fida Hasan, Leonie Simpson, Mir Ali Rezazadeh Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, and Matthew McKague | 2307.06520 | cs.CR | 2023-07-14 |
| TPU作为密码学加速器 | Rabimba Karanjai and Sangwon Shin and Xinxin Fan and Lin Chen and Tianwei Zhang and Taeweon Suh and Weidong Shi and Lei Xu | 2307.06554 | cs.CR | 2023-07-14 |
| 墙后的数据:一种用于数据隐私管理的先进架构 | Amen Faridoon, M. Tahar Kechadi | 2307.06779 | cs.CR | 2023-07-14 |