Search

Showing total 13,635 results

Search Constraints

Start Over You searched for: Topic cryptography and security (cs.cr) Remove constraint Topic: cryptography and security (cs.cr)
13,635 results

Search Results

1. No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

2. The Mirage of Breaking MIRAGE: Refuting the HPCA-2023 Paper 'Are Randomized Caches Truly Random?'

3. A short note on the paper 'Are Randomized Caches Really Random?'

4. From Malware Samples to Fractal Images: A New Paradigm for Classification. (Version 2.0, Previous version paper name: Have you ever seen malware?)

5. Discussion Paper: The Threat of Real Time Deepfakes

6. Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper

7. Family-Based Fingerprint Analysis: A Position Paper

8. A Dataset on Malicious Paper Bidding in Peer Review

9. Embracing Graph Neural Networks for Hardware Security (Invited Paper)

10. Tradeoffs in Preventing Manipulation in Paper Bidding for Reviewer Assignment

11. SealClub: Computer-aided Paper Document Authentication

12. About being the Tortoise or the Hare? - A Position Paper on Making Cloud Applications too Fast and Furious for Attackers

13. GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs)

14. Rethinking blockchain security: Position paper

15. Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers

16. Consumer Centric Data Control, Tracking and Transparency -- A Position Paper

17. Towards Verifiable Remote Voting with Paper Assurance

18. Making Paper Reviewing Robust to Bid Manipulation Attacks

19. Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

20. What Are Cybersecurity Education Papers About?

21. Internet Security Awareness of Filipinos: A Survey Paper

22. Short Paper: Privacy Comparison of Contact Tracing Mobile Applications for COVID-19

23. Short Paper: Design and Evaluation of Privacy-preserved Supply Chain System based on Public Blockchain

24. Wet paper codes and the dual distance in steganography

25. MIT SafePaths Card (MiSaCa): Augmenting Paper Based Vaccination Cards with Printed Codes

26. IBM Federated Learning: an Enterprise Framework White Paper V0.1

27. COVI White Paper

28. 6G White paper: Research challenges for Trust, Security and Privacy

29. Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)

30. A position paper on GDPR compliance in sharded blockchains: rehash of old ideas or new interesting challenges?

31. Cyber-Risks in Paper Voting

32. Deep Learning Application in Security and Privacy -- Theory and Practice: A Position Paper

33. Galaxy Learning -- A Position Paper

34. (Short Paper) Towards More Reliable Bitcoin Timestamps

35. Ensuring message embedding in wet paper steganography

36. Texture to the Rescue : Practical Paper Fingerprinting based on Texture Patterns

37. On the 'Cracking' Scheme in the Paper 'A Directional Coupler Attack Against the Kish Key Distribution System' by Gunn, Allison and Abbott

38. Breaching the Privacy of Israel’s Paper Ballot Voting System

39. Survey Paper on Rising Threats of Subverting Privacy Infrastructure

40. A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers

41. Short Paper: On Deployment of DNS-based Security Enhancements

42. ZeroDB white paper

43. Privacy by Design: From Technologies to Architectures (Position Paper)

44. Wet Paper Coding for Watermarking of Binary Images

45. Secure Remote Voting Using Paper Ballots

46. SECOQC Business White Paper

47. Protecting Privacy and Transforming COVID-19 Case Surveillance Datasets for Public Use

48. SGX Switchless Calls Made Configless

49. Human-Computer Interaction Considerations When Developing Cyber Ranges

50. A First Look at Scams on YouTube