Suchergebnisse - "Cryptography and Security (cs.CR)"
-
1
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS). :1-7
Schlagwörter: FOS: Computer and information sciences, IP Piracy, Side-channel analysis, Cryptography and Security, Deep neural network, Reverse engineering, Cryptography and Security (cs.CR), [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
-
2
Autoren:
Weitere Verfasser:
Quelle: 2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS). :1-7
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, Hardware Trojans, Hardware Security, RISC-V, Error Correction Codes, Cryptography and Security (cs.CR), Microprocessor-based System, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
Zugangs-URL: http://arxiv.org/abs/2506.15417
-
3
Autoren: Pierrick Dartois
Quelle: Journal of Algebra. 683:449-514
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, FOS: Mathematics, 14K02, 14Q15, 11T71, Algebraic Geometry, Cryptography and Security (cs.CR), Algebraic Geometry (math.AG)
Zugangs-URL: http://arxiv.org/abs/2407.15492
-
4
Autoren: et al.
Quelle: European Journal of Operational Research. 327:191-202
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Statistics - Machine Learning, Machine Learning (stat.ML), Applications (stat.AP), Statistics - Applications, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2411.14351
-
5
Autoren: et al.
Quelle: IEEE Transactions on Parallel and Distributed Systems. 36:2264-2280
Schlagwörter: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2410.05934
-
6
Autoren: et al.
Quelle: 2025 IEEE 50th Conference on Local Computer Networks (LCN). :1-10
Schlagwörter: Machine Learning, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Artificial Intelligence (cs.AI), Emerging Technologies (cs.ET), Cryptography and Security, Artificial Intelligence, Networking and Internet Architecture, Cryptography and Security (cs.CR), Emerging Technologies, Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2509.12233
-
7
Autoren: et al.
Quelle: 2025 IEEE 50th Conference on Local Computer Networks (LCN). :1-9
Schlagwörter: Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Cryptography and Security, Networking and Internet Architecture, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2508.14526
-
8
Autoren: et al.
Quelle: 2025 IEEE 50th Conference on Local Computer Networks (LCN). :1-9
Schlagwörter: Networking and Internet Architecture (cs.NI), Performance (cs.PF), FOS: Computer and information sciences, Cryptography and Security, Networking and Internet Architecture, Performance, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2507.17074
-
9
Autoren:
Quelle: 2025 IEEE 50th Conference on Local Computer Networks (LCN). :1-9
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, Distributed, Parallel, and Cluster Computing, Distributed, Parallel, and Cluster Computing (cs.DC), Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2508.01107
-
10
Autoren: et al.
Quelle: 2025 IEEE 50th Conference on Local Computer Networks (LCN). :1-10
Schlagwörter: Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Networking and Internet Architecture, Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2508.03321
-
11
Autoren: et al.
Quelle: 2025 IEEE 50th Conference on Local Computer Networks (LCN). :1-4
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, Computation and Language, Cryptography and Security (cs.CR), Computation and Language (cs.CL)
Zugangs-URL: http://arxiv.org/abs/2508.00659
-
12
Autoren:
Quelle: Proceedings of the 13th Workshop on Encrypted Computing & Applied Homomorphic Computing. :50-61
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2507.07972
-
13
Autoren: et al.
Quelle: Proceedings on Privacy Enhancing Technologies. 2025:912-925
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2506.13052
-
14
Autoren: et al.
Quelle: Proceedings on Privacy Enhancing Technologies. 2025:94-111
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2507.07210
-
15
Autoren: et al.
Quelle: Proceedings on Privacy Enhancing Technologies. 2025:679-695
Schlagwörter: FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2506.16891
-
16
Autoren: et al.
Quelle: Proceedings on Privacy Enhancing Technologies. 2025:392-409
Schlagwörter: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2501.01131
-
17
Autoren:
Quelle: Proceedings on Privacy Enhancing Technologies. 2025:201-215
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2502.08001
-
18
Autoren: et al.
Quelle: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 44:3910-3923
Schlagwörter: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Hardware Architecture (cs.AR), Computer Science - Hardware Architecture, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2404.18407
-
19
Autoren:
Quelle: Proceedings on Privacy Enhancing Technologies. 2025:861-880
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2504.19274
-
20
Autoren: et al.
Quelle: IEEE Transactions on Mobile Computing. 24:9383-9394
Schlagwörter: Computer Science - Networking and Internet Architecture, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2303.12811
Nájsť tento článok vo Web of Science
Full Text Finder