We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 164

[ total of 182 entries: 1-100 | 65-164 | 165-182 ]
[ showing 100 entries per page: fewer | more | all ]

Mon, 1 Dec 2025 (continued, showing last 18 of 43 entries)

[165]  arXiv:2511.22017 [pdf, ps, other]
Title: POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2511.21999 [pdf, ps, other]
Title: GECKO: Securing Digital Assets Through(out) the Physical World (Extended Technical Report)
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2511.21901 [pdf, ps, other]
Title: Standardized Threat Taxonomy for AI Security, Governance, and Regulatory Compliance
Authors: Hernan Huwyler
Comments: 10 pages, LaTeX. Preprint available on Zenodo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Risk Management (q-fin.RM)
[168]  arXiv:2511.21804 [pdf, ps, other]
Title: Beyond Membership: Limitations of Add/Remove Adjacency in Differential Privacy
Comments: 17 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2511.21803 [pdf, ps, other]
Title: Cross-Layer Detection of Wireless Misbehavior Using 5G RAN Telemetry and Operational Metadata
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2511.21795 [pdf, ps, other]
Title: Advanced Data Collection Techniques in Cloud Security: A Multi-Modal Deep Learning Autoencoder Approach
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2511.21768 [pdf, ps, other]
Title: Categorical Framework for Quantum-Resistant Zero-Trust AI Security
Subjects: Cryptography and Security (cs.CR); Category Theory (math.CT); Quantum Physics (quant-ph)
[172]  arXiv:2511.21764 [pdf, ps, other]
Title: Adaptive Detection of Polymorphic Malware: Leveraging Mutation Engines and YARA Rules for Enhanced Security
Comments: 11 pages, 4 figures, 4 tables, 2 snapshots. Author Chinmay Prawah Pant contributed to proofreading, presentation improvements, and organizational support; core research, methodology, and experimentation were conducted by the main authors
Subjects: Cryptography and Security (cs.CR)
[173]  arXiv:2511.21758 [pdf, ps, other]
Title: A Longitudinal Measurement of Privacy Policy Evolution for Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[174]  arXiv:2511.23406 (cross-list from cs.IT) [pdf, ps, other]
Title: Quantum Private Distributed Matrix Multiplication With Degree Tables
Comments: The abstract here is trimmed due to the space limitations in the submission process
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP); Quantum Physics (quant-ph)
[175]  arXiv:2511.23278 (cross-list from cs.NI) [pdf, ps, other]
Title: RetryGuard: Preventing Self-Inflicted Retry Storms in Cloud Microservices Applications
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[176]  arXiv:2511.22924 (cross-list from cs.MA) [pdf, ps, other]
Title: AgentShield: Make MAS more secure and efficient
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[177]  arXiv:2511.22859 (cross-list from eess.IV) [pdf, ps, other]
Title: TokCom-UEP: Semantic Importance-Matched Unequal Error Protection for Resilient Image Transmission
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR)
[178]  arXiv:2511.22359 (cross-list from cs.SE) [pdf, ps, other]
Title: UniBOM -- A Unified SBOM Analysis and Visualisation Tool for IoT Systems and Beyond
Comments: This paper has been accepted at the ACM 15th International Conference on the Internet of Things (ACM IoT 2025)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[179]  arXiv:2511.22147 (cross-list from cs.CV) [pdf, ps, other]
Title: RemedyGS: Defend 3D Gaussian Splatting against Computation Cost Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[180]  arXiv:2511.21990 (cross-list from cs.LG) [pdf, ps, other]
Title: A Safety and Security Framework for Real-World Agentic Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[181]  arXiv:2511.21842 (cross-list from cs.LG) [pdf, ps, other]
Title: Unsupervised Anomaly Detection for Smart IoT Devices: Performance and Resource Comparison
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[182]  arXiv:2511.21757 (cross-list from cs.CY) [pdf, ps, other]
Title: Medical Malice: A Dataset for Context-Aware Safety in Healthcare LLMs
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[ total of 182 entries: 1-100 | 65-164 | 165-182 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)