Sort by
Moving-Skewness Preprocessing for Simple Power Analysis on Cryptosystems: Revealing Asymmetry in Leakage
Zhen Li
,Kexin Qiang
,Yiming Yang
,Zongyue Wang
,An Wang
Posted: 05 March 2026
Early Detection of Re-Identification Risk in Multi-Turn Dialogues via Entity-Aware Evidence Accumulation
Yeongseop Lee
,Seungun Park
,Yunsik Son
Posted: 03 March 2026
Recovering Error-Free Cryptographic Keys from Noisy Quantum Key Distribution and Independent Eavesdropper Detection on the Receiving End
Dina Ghanai Miandoab
,Brit Riggs
,Nicholas Navas
,Bertrand Cambou
Posted: 03 March 2026
Reinforcement Learning-Guided Input Scheduling for Kernel Fuzzing
Javier Ruiz
,Laura Fernández
,María González
Posted: 02 March 2026
An Ontology-Based Framework for Cyber Range Representation
Vyron Kampourakis
,Michail Takaronis
,Vasileios Gkioulos
,Sokratis Katsikas
Posted: 28 February 2026
A Survey on the Unique Security of Autonomous and Collaborative LLM Agents: Threats, Defenses, and Futures
Yinggang Sun
,Haining Yu
,Wei Jiang
,Xiangzhan Yu
,Dongyang Zhan
,Lixu Wang
,Siyue Ren
,Yue Sun
,Tianqing Zhu
Posted: 26 February 2026
LDSEGoV: An Efficient Lightweight Digital Signature Scheme
for E-Governance Authentication
Seema Sirpal
,Pardeep Singh
,Om Pal
Posted: 25 February 2026
Security Interface for Execution Control from a Tightly-Coupled Security Core
Stefan Ivanov Stoyanov
,Maria Marinova
,Nikolay Rumenov Kakanakov
Posted: 12 February 2026
Challenges with Electronic Identity Authentication: A Qualitative Study with Disabled Participants
David Cropley
,Paul Whittington
,Huseyin Dogan
Posted: 10 February 2026
Lifetime-Aware Kernel Object Isolation Using Temporal Protection Windows
Emily C. Rogers
,Daniel K. Foster
,Sarah L. Chen
,Michael J. Turner
Posted: 05 February 2026
Formal Verification of PKS-Based Kernel Isolation Policies Using State Transition Models
Ananya Kapoor
,Vikram Subramanian
,Rohan Mehta
Posted: 05 February 2026
A Multi-Layered Security Model: The Human Factor, Identification, and Secure Network Communications
Zhuldyz Tashenova
,Askhatov Alim
,Gabdullin Abzal
,Abdikhaimov Yelnur
,Raiskanov Rassul
,Oryntay Al-Tarazi
,Zhanat Abdugulova
,Shirin Amanzholova
Posted: 05 February 2026
Practical Reliability Constraints on Grover-Based Quantum Attacks Against Symmetric Cryptography
José Israel Nadal Vidal
Posted: 03 February 2026
An Experimental Comparison of Enclave TokenVaults and HSMs for Real-Time Card Tokenization
Vimal Teja Manne
Posted: 29 January 2026
Investigating Post-Quantum Cryptography to Secure Transmitted Data via Mobile Communication
Rongjie Zhou
,Huaqun Guo
,Francis E C Teo
Posted: 26 January 2026
A Lightweight Application-Layer Defense Against Relay Attacks in Contactless Transactions
Vimal Teja Manne
Posted: 23 January 2026
The Influence of the Form of Digital Etalons on the Effectiveness of Associative Security
Vadim Raikhlin
,Ruslan Gibadullin
,Alexey Boyko
Posted: 22 January 2026
Trade-Offs in Kubernetes Security and Energy Consumption
Ioannis Dermentzis
,Georgios Koukis
,Vassilis Tsaoussidis
Posted: 07 January 2026
Comparing the Use of EMBA for IoT Firmware Security Analysis on Cloud Services and Standalone Servers
Kenan Sansal Nuray
,Oren Upton
,Nicole Lang Beebe
Posted: 06 January 2026
Auditing Inferential Blind Spots: A Framework for Evaluating Forensic Coverage in Network Telemetry Architectures
Mehrnoush Vaseghipanah
,Sam Jabbehdari
,Hamidreza Navidi
Posted: 06 January 2026
of 20