Researchain
Decentralized Journals
A
Archives
Welcome to Researchain!
Feedback Center
Decentralized Journals
A
Archives
Updated
Computer Science
Cryptography and Security
Cryptographic Authentication of Navigation Protocols
Sam Bretheim
Abstract
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Full PDF
Related Researches
Making Paper Reviewing Robust to Bid Manipulation Attacks
by
Ruihan Wu
Synthesis of Winning Attacks on Communication Protocols using Supervisory Control Theory
by
Shoma Matsui
Avaddon ransomware: an in-depth analysis and decryption of infected systems
by
Javier Yuste
AI-based Blackbox Code Deobfuscation: Understand, Improve and Mitigate
by
Grégoire Menguy
BASALT : A Rock-Solid Foundation for Epidemic Consensus Algorithms in Very Large, Very Open Networks
by
Alex Auvolat
Cryptographic multilinear maps using pro-p groups
by
Delaram Kahrobaei
A Real-time Defense against Website Fingerprinting Attacks
by
Shawn Shan
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
by
Priyanka Ranade
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack
by
Ding Sheng Ong
Privacy-preserving Cloud-based DNN Inference
by
Shangyu Xie
Fairness in ERC token markets: A Case Study of CryptoKitties
by
Kentaro Sako
What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things
by
Lorenzo Ghiro
Blockchain Gateways, Bridges and Delegated Hash-Locks
by
Thomas Hardjono
Privacy-Preserving Feature Selection with Secure Multiparty Computation
by
Xiling Li
Privacy-Preserving Video Classification with Convolutional Neural Networks
by
Sikha Pentyala
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks
by
Seonghoon Jeong
FFConv: Fast Factorized Neural Network Inference on Encrypted Data
by
Yuxiao Lu
uTango: an open-source TEE for the Internet of Things
by
Daniel Oliveira
When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels
by
Xiaoxuan Lou
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
by
Christof Ferreira Torres
Randomized Controlled Trials with Minimal Data Retention
by
Winston Chou
Smart Auto Insurance: High Resolution, Dynamic, Privacy-Driven, Telematic Insurance
by
Michael Bartholic
Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions
by
Marcus Niemietz
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis
by
Anna Georgiadou
PredCoin: Defense against Query-based Hard-label Attack
by
Junfeng Guo
«
1
2
3
4
»
Submitted on 9 Oct 2005
Updated
arXiv.org
Original Source
NASA ADS
Google Scholar
Semantic Scholar