Search

Showing total 60 results

Search Constraints

Start Over You searched for: Topic cryptography and security (cs.cr) Remove constraint Topic: cryptography and security (cs.cr) Publisher springer science and business media llc Remove constraint Publisher: springer science and business media llc
60 results

Search Results

1. Code-based signatures from new proofs of knowledge for the syndrome decoding problem

2. Two Standard Decks of Playing Cards are Sufficient for a ZKP for Sudoku

3. Statistical inference attack against PHY-layer key extraction and countermeasures

4. Real-time monitoring as a supplementary security component of vigilantism in modern network environments

5. CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

6. A blockchain-based secure storage scheme for medical information

7. On the near prime-order MNT curves

8. Cooperative distributed state estimation: resilient topologies against smart spoofers

9. The $$k$$ -error linear complexity distribution for $$2^n$$ -periodic binary sequences

10. AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking

11. DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning

12. IPatch: a remote adversarial patch

13. Reliable detection of compressed and encrypted data

14. The sum of its parts: Analysis of federated byzantine agreement systems

15. A privacy-preserving model based on differential approach for sensitive data in cloud environment

16. Student assessment in cybersecurity training automated by pattern mining and clustering

17. Free gap estimates from the exponential mechanism, sparse vector, noisy max and related algorithms

18. A post-quantum key exchange protocol from the intersection of quadric surfaces

19. Generative adversarial networks and image-based malware classification

20. Adversarial example detection for DNN models: a review and experimental comparison

21. Enumeration of maximal cycles generated by orthogonal cellular automata

22. The elliptic net algorithm revisited

23. The Effect of Fatigue on the Performance of Online Writer Recognition

24. Serverless computing: a security perspective

25. Privacy and data balkanization: circumventing the barriers

26. File fragment recognition based on content and statistical features

27. A firefly algorithm for power management in wireless sensor networks (WSNs)

28. Consensus with preserved privacy against neighbor collusion

29. Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning

30. Breaking an image encryption scheme based on Arnold map and Lucas series

31. Covert Computation in Self-Assembled Circuits

32. A secure and improved multi server authentication protocol using fuzzy commitment

33. On optimal weak algebraic manipulation detection codes and weighted external difference families

34. Indexing structures for the PLS blockchain

35. Fixing vulnerabilities potentially hinders maintainability

36. Quantum federated learning through blind quantum computing

37. Full classification of permutation rational functions and complete rational functions of degree three over finite fields

38. A Survey on Trust Modeling from a Bayesian Perspective

39. An authentication protocol based on chaos and zero knowledge proof

40. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

41. Unicyclic strong permutations

42. Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

43. Optical designs for realization of a set of schemes for quantum cryptography

44. Leveraging blockchain for immutable logging and querying across multiple sites

45. Linear complexity of Ding-Helleseth generalized cyclotomic sequences of order eight

46. Cyclic group based mutual authentication protocol for RFID system

47. Characterization of Secure Multiparty Computation Without Broadcast

48. Optimal noise functions for location privacy on continuous regions

49. Dimensionality distinguishers

50. Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST