加载中 . . .
中文标题 作者 论文ID 分类简称 发布时间
追踪基于环剩余类的$R_{q,0} \times R_q$-PLWE非分裂情况下的密码分析 Iv''an Blanco-Chac''on and Ra''ul Dur''an-D''iaz and Rahinatou Yuh Njah Nchiwo and Beatriz Barbero-Lucas 2209.11962 cs.CR 2023-07-18
未知领域:无电池物联网中的能量攻击 Luca Mottola, Arslan Hameed, and Thiemo Voigt 2304.08224 cs.CR 2023-07-18
恶意软件的财务和运营:基于数据的感染与受损访问价值链研究 Juha Nurmi, Mikko Niemel"a, Billy Bob Brumley 2306.15726 cs.CR 2023-07-18
评估和利用域名错误信息 Blake Anderson and David McGrew 2307.07610 cs.CR 2023-07-18
沙特阿拉伯对安全、隐私和使用人脸识别技术的态度 Amani Mohammed Alqarni, Daniel Timko and Muhammad Lutfor Rahman 2307.07671 cs.CR 2023-07-18
理解针对大学、学院和学校的网络威胁 Harjinder Singh Lallie and Andrew Thompson and Elzbieta Titis and Paul Stephens 2307.07755 cs.CR 2023-07-18
超级Go:基于概率的有向混合模糊测试 Peihong Lin and Pengfei Wang and Xu Zhou and Wei Xie and Kai Lu and Gen Zhang 2307.07815 cs.CR 2023-07-18
本地差分隐私计算中的知识获取作为隐私损失 Mingen Pan 2307.08159 cs.CR 2023-07-18
自编码器无线系统中的隐蔽通信 Ali Mohammadi Teshnizi, Majid Ghaderi, Dennis Goeckel 2307.08195 cs.CR 2023-07-18
通过身份验证证明降低对自动证书颁发机构的信任 Zachary Newman 2307.08201 cs.CR 2023-07-18
我们到达了吗?基于溯源的终点检测和响应工具的工业视角 Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen 2307.08349 cs.CR 2023-07-18
基于元数据的机器学习在安卓上的恶意软件检测 Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko 2307.08547 cs.CR 2023-07-18
G-Scan:用于智能合约中行级漏洞识别的图神经网络 Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar 2307.08549 cs.CR 2023-07-18
TorMult:引入一种新型Tor带宽膨胀攻击 Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala 2307.08550 cs.CR 2023-07-18
基于MinRank问题和MPC-in-the-Head范式的数字签名方案:MIRA Nicolas Aragon, Lo"ic Bidoux, Jes''us-Javier Chi-Dom''inguez, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain 2307.08575 cs.CR 2023-07-18
基于威胁情报的方法论:将不确定性纳入网络风险分析并加强决策 Martijn Dekker and Lampis Alevizos 2302.13082 cs.CR 2023-07-17
联邦学习中的公平性和隐私保护:一项调查 Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae 2306.08402 cs.CR 2023-07-17
入侵检测误报率对分析员绩效影响的控制实验 Lucas Layman and William Roden 2307.07023 cs.CR 2023-07-17
软件保护研究中的评估方法学 Patrick Kochberger, Sebastian Schrittwieser, Bart Coppens, Bjorn De Sutter 2307.07300 cs.CR 2023-07-17
TUSH-Key:硬件密钥上的可迁移用户秘密 Aditya Mitra, Anisha Ghosh, Sibi Chakkaravarthy Sethuraman 2307.07484 cs.CR 2023-07-17
CageCoach:面向共享的可编辑分布式加密文件系统 Jason Carpenter and Zhi-Li Zhang 2301.04214 cs.CR 2023-07-14
组件认证的安全协议和数据模型(SPDM)的基准测试 Renan C. A. Alves, Bruno C. Albertini, Marcos A. Simplicio Jr 2307.06456 cs.CR 2023-07-14
迁移到后量子密码学:使用安全依赖分析的框架 Khondokar Fida Hasan, Leonie Simpson, Mir Ali Rezazadeh Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, and Matthew McKague 2307.06520 cs.CR 2023-07-14
TPU作为密码学加速器 Rabimba Karanjai and Sangwon Shin and Xinxin Fan and Lin Chen and Tianwei Zhang and Taeweon Suh and Weidong Shi and Lei Xu 2307.06554 cs.CR 2023-07-14
墙后的数据:一种用于数据隐私管理的先进架构 Amen Faridoon, M. Tahar Kechadi 2307.06779 cs.CR 2023-07-14