Researchain
Decentralized Journals
A
Archives
Welcome to Researchain!
Feedback Center
Decentralized Journals
A
Archives
Updated
Computer Science
Cryptography and Security
Cryptographic Authentication of Navigation Protocols
Sam Bretheim
Abstract
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Full PDF
Related Researches
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency
by
Kiavash Satvat
Cybersecurity Threats in Connected and Automated Vehicles based Federated Learning Systems
by
Ranwa Al Mallah
GraphSense: A General-Purpose Cryptoasset Analytics Platform
by
Bernhard Haslhofer
Collective Intelligence: Decentralized Learning for Android Malware Detection in IoT with Blockchain
by
Rajesh Kumar
An Exploration of Hot-Spots in Locimetric Passwords
by
Antonios Saravanos
Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices
by
Parvaneh Asghari
Building Blocks of Sharding Blockchain Systems: Concepts, Approaches, and Open Problems
by
Yizhong Liu
Leveraged Trading on Blockchain Technology
by
Johannes Rude Jensen
Swivel: Hardening WebAssembly against Spectre
by
Shravan Narayan
Discrete Distribution Estimation with Local Differential Privacy: A Comparative Analysis
by
Ba Dung Le
Understanding Worldwide Private Information Collection on Android
by
Yun Shen
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites
by
Mir Mehedi Ahsan Pritom
On the Estimation of the Number of Unreachable Peers in the Bitcoin P2P Network by Observation of Peer Announcements
by
Matthias Grundmann
Deep Adversarial Learning on Google Home devices
by
Andrea Ranieri
File fragment recognition based on content and statistical features
by
Marzieh Masoumi
Blockchained Federated Learning for Threat Defense
by
Konstantinos Demertzis
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses
by
Mir Mehedi Ahsan Pritom
Scaling Distributed Ledgers and Privacy-Preserving Applications
by
Alberto Sonnino
Computing Differential Privacy Guarantees for Heterogeneous Compositions Using FFT
by
Antti Koskela
Attestation Infrastructures for Private Wallets
by
Thomas Hardjono
Analyzing Confidentiality and Privacy Concerns: Insights from Android Issue Logs
by
Sherlock A. Licorish
Long-term IaaS Provider Selection using Short-term Trial Experience
by
Sheik Mohammad Mostakim Fattah
A Quantitative Metric for Privacy Leakage in Federated Learning
by
Yong Liu
Lossless Compression of Efficient Private Local Randomizers
by
Vitaly Feldman
Automated Fuzzing of Automotive Control Units
by
Timothy Werquin
«
1
2
3
4
»
Submitted on 9 Oct 2005
Updated
arXiv.org
Original Source
NASA ADS
Google Scholar
Semantic Scholar