Sort by
Optimizing Multi-Scalar Multiplication Over Fixed Bases
Saulius Grigaitis
Posted: 02 April 2026
Efficient Online Computation of Mean, Median, and Standard Deviation as Continuous Health Tests for HRNGs
Sara Malik
,N.A. Ahmed
Posted: 24 March 2026
Human-Centric Zero Trust Identity Architecture for the Fifth Industrial Revolution: A JEPA-Driven Approach to Adaptive Identity Governance
Jovita T. Nsoh
Posted: 20 March 2026
Hybrid Deep Architectures in Contrastive Latent Space: Performance Analysis of VAE-MLP, VAE-MoTE, and VAE-GAT for IoT Botnet Detection
Hassan Wasswa
,Timothy Lynar
Posted: 19 March 2026
Challenges with Electronic Identity Authentication: A Qualitative Study with Disabled Participants
David Cropley
,Paul Whittington
,Huseyin Dogan
Posted: 18 March 2026
Managed Trust and Operational Resilience While Implementing Zero-Trust Architecture in a Multi-Stakeholder Telecommunications Organization
Guy E. Toibin
,Yotam Lurie
,Shlomo Mark
Posted: 17 March 2026
Attacks and Defenses in Differentially Private Deep Learning: New Security Risks in New Era
Kaiyan Zhao
,Zhe Sun
,Lihua Yin
,Tianqing Zhu
Posted: 16 March 2026
Real User Instruction: Black-Box Instruction Authentication Middleware Against Indirect Prompt Injection
Jingtang Luo
,Chenlin Zhang
Posted: 13 March 2026
GeoVault: Leveraging Human Spatial Memory for Secure Cryptographic Key Management
Marko Corn
,Primož Podržaj
Posted: 12 March 2026
A Survey on the Unique Security of Autonomous and Collaborative LLM Agents: Threats, Defenses, and Futures
Yinggang Sun
,Haining Yu
,Wei Jiang
,Xiangzhan Yu
,Dongyang Zhan
,Lixu Wang
,Siyue Ren
,Yue Sun
,Tianqing Zhu
Posted: 10 March 2026
LLM-Based Classification of CVEs for Vulnerability Analysis in Medical IT Systems
Pere Vidiella
,Pere Tuset-Peiró
,Josep Pegueroles
,Michael Pilgermann
Posted: 10 March 2026
HyperShield: An Automated Evaluation Platform for Security and Performance Trade-Offs in Virtual Systems
Faiz Alam
,Mohammed Mubeen Mifthak
,Sahil Purohit
,Md Shadab
,Gregory T Byrd
,Khaled Harfoush
Posted: 09 March 2026
Moving-Skewness Preprocessing for Simple Power Analysis on Cryptosystems: Revealing Asymmetry in Leakage
Zhen Li
,Kexin Qiang
,Yiming Yang
,Zongyue Wang
,An Wang
Posted: 05 March 2026
Early Detection of Re-Identification Risk in Multi-Turn Dialogues via Entity-Aware Evidence Accumulation
Yeongseop Lee
,Seungun Park
,Yunsik Son
Posted: 03 March 2026
Recovering Error-Free Cryptographic Keys from Noisy Quantum Key Distribution and Independent Eavesdropper Detection on the Receiving End
Dina Ghanai Miandoab
,Brit Riggs
,Nicholas Navas
,Bertrand Cambou
Posted: 03 March 2026
Reinforcement Learning-Guided Input Scheduling for Kernel Fuzzing
Javier Ruiz
,Laura Fernández
,María González
Posted: 02 March 2026
An Ontology-Based Framework for Cyber Range Representation
Vyron Kampourakis
,Michail Takaronis
,Vasileios Gkioulos
,Sokratis Katsikas
Posted: 28 February 2026
LDSEGoV: An Efficient Lightweight Digital Signature Scheme
for E-Governance Authentication
Seema Sirpal
,Pardeep Singh
,Om Pal
Posted: 25 February 2026
Security Interface for Execution Control from a Tightly-Coupled Security Core
Stefan Ivanov Stoyanov
,Maria Marinova
,Nikolay Rumenov Kakanakov
Posted: 12 February 2026
Lifetime-Aware Kernel Object Isolation Using Temporal Protection Windows
Emily C. Rogers
,Daniel K. Foster
,Sarah L. Chen
,Michael J. Turner
Posted: 05 February 2026
of 20