Cs-Cr
Linear Relation on General Ergodic T-Function
Almost-perfect secret sharing
Key Management in Mobile Sensor Networks
Secret Key Generation from Channel Noise with the Help of a Common Key
SIG-DB: leveraging homomorphic encryption to Securely Interrogate privately held Genomic DataBases
Malware detection techniques for mobile devices
Information Security in Health Care Centre Using Cryptography and Steganography
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks
Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System
Evaluating Certificate Policy - Certification Practice Statement of Unique Government Certification Authority using Public Key Infrastructure Assessment Guidelines: Research in Progress
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
Protecting User Privacy Based on Secret Sharing with Error Tolerance for Big Data in Smart Grid
A Lightweight Signature-Based IDS for IoT Environment
Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques
An efficient multi-use multi-secret sharing scheme based on hash function
Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity
Jailbreaking Attacks vs. Content Safety Filters: How Far Are We in the LLM Safety Arms Race?
FedLiTeCAN : A Federated Lightweight Transformer for Fast and Robust CAN Bus Intrusion Detection
EquaCode: A Multi-Strategy Jailbreak Approach for Large Language Models via Equation Solving and Code Completion
PatchBlock: A Lightweight Defense Against Adversarial Patches for Embedded EdgeAI Devices
Aggressive Compression Enables LLM Weight Theft