Researchain
Decentralized Journals
A
Archives
Welcome to Researchain!
Feedback Center
Decentralized Journals
A
Archives
Updated
Computer Science
Cryptography and Security
Cryptographic Authentication of Navigation Protocols
Sam Bretheim
Abstract
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Full PDF
Related Researches
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks
by
Thilo Krachenfels
Data Driven Testing of Cyber Physical Systems
by
Dmytro Humeniuk
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
by
Liuqiao Chen
A Survey on Amazon Alexa Attack Surfaces
by
Yanyan Li
Towards Activity-Centric Access Control for Smart Collaborative Ecosystems
by
Maanak Gupta
Usability and Security of Different Authentication Methods for an Electronic Health Records System
by
Saptarshi Purkayastha
Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed
by
Patrick Wlazlo
Introducing a Novel Data over Voice Technique for Secure Voice Communication
by
Piotr Krasnowski
FASTEN: Fair and Secure Distributed Voting Using Smart Contracts
by
Sankarshan Damle
Demystifying Cryptocurrency Mining Attacks: A Semi-supervised Learning Approach Based on Digital Forensics and Dynamic Network Characteristics
by
Aaron Zimba
A Ransomware Classification Framework Based on File-Deletion and File-Encryption Attack Structures
by
Aaron Zimba
Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
by
Luis Puche Rondon
Content Confidentiality in Named Data Networking
by
Aleksandr Lenin
Detecting Compliance of Privacy Policies with Data Protection Laws
by
Ayesha Qamar
A Novel Key Generation Scheme Using Quaternary PUF Responses and Wiretap Polar Coding
by
Yonghong Bai
WaNet -- Imperceptible Warping-based Backdoor Attack
by
Anh Nguyen
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh
by
Zhi Zhang
When Crowdsensing Meets Federated Learning: Privacy-Preserving Mobile Crowdsensing System
by
Bowen Zhao
Design of Ciphers based on the Geometric Structure of the Möbius Plane
by
Christoph Capellaro
Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis
by
Zhilong Wang
A Historical and Statistical Studyof the Software Vulnerability Landscape
by
Assane Gueye
Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid
by
Muneeb Ul Hassan
VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants
by
Muneeb Ul Hassan
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems
by
Yinbo Yu
PatternMonitor: a whole pipeline with a much higher level of automation for guessing Android lock pattern based on videos
by
Yangde Wang
«
1
2
3
4
»
Submitted on 9 Oct 2005
Updated
arXiv.org
Original Source
NASA ADS
Google Scholar
Semantic Scholar