Computer Science, Cryptography and Security
Category: Cryptography and Security
Page 3/7
Computer Science, Cryptography and Security
Achieving Best Goodput in MAC Aggregation Schemes
Computer Science, Cryptography and Security
Defending Deep Neural Networks Against Voice Interface Attacks: A New Frontier in Cybersecurity
Computer Science, Cryptography and Security
Constructing TPE-Resistant Prompts Using STP
Computer Science, Cryptography and Security
Speculative Execution Attacks and Mitigations in Cryptographic Code
Computer Science, Cryptography and Security
Skimming Acceleration for Efficient Language Models
Computer Science, Cryptography and Security
Reimagining Tech: The Future of Innovation
Computer Science, Cryptography and Security
Enhancing ADS-B Security with Cryptographic Techniques
Computer Science, Cryptography and Security
Fairness in Machine Learning: Challenges, Metrics, and Improvements
Computer Science, Cryptography and Security
Unlocking Key Lengths: A Deep Learning Approach to Vigenere Ciphers
Computer Science, Cryptography and Security
Protecting Patient Data: A Study of Security and Privacy in Electronic Health Records
Computer Science, Cryptography and Security
Centralized Tag Management Systems: A Solution to Manual Tag Configuration
Computer Science, Cryptography and Security
Secure Protocol for Attestation and Verification of Devices
Computer Science, Cryptography and Security
Understanding Binary Code with Machine Learning and Compiler Optimizations
Computer Science, Cryptography and Security
Efficient Distributed Optimization with Mutual Information-based Privacy Preservation
Computer Science, Cryptography and Security
Privacy-Preserving Federated K-Means Clustering: A Comprehensive Analysis
Computer Science, Cryptography and Security
NFTs at Risk: A Guide to Common Security Threats and How to Mitigate Them
Computer Science, Cryptography and Security
Enhancing KEM-IND-CCA Security Through Forward Path Truncation and Tagging Attack Handling
Computer Science, Cryptography and Security
RAF Tokens: Mitigating the Bearer Token Problem
Computer Science, Cryptography and Security