arxiv cs.CR
banner
arxiv-cs-cr.bsky.social
arxiv cs.CR
@arxiv-cs-cr.bsky.social
Computer Science -- Cryptography and Security (cs.CR)

source: export.arxiv.org/rss/cs.CR
maintainer: @tmaehara.bsky.social
Joner Assolin, Diego Kreutz, Leandro Bertholdo
IoTEdu: Access Control, Detection, and Automatic Incident Response in Academic IoT Networks
https://arxiv.org/abs/2512.09934
December 12, 2025 at 8:02 AM
Balakumar Ravindranath Kunthu, Ranganath Nagesh Taware, Sathish Krishna Anumula
Blockchain-Anchored Audit Trail Model for Transparent Inter-Operator Settlement
https://arxiv.org/abs/2512.09938
December 12, 2025 at 8:01 AM
Mohammad M Maheri, Sunil Cotterill, Alex Davidson, Hamed Haddadi
ZK-APEX: Zero-Knowledge Approximate Personalized Unlearning with Executable Proofs
https://arxiv.org/abs/2512.09953
December 12, 2025 at 8:01 AM
Pravin G
Cross-Layer Isochronous Diffusion Protocol (CIDP): A Rigorous Information-Theoretic and Control-Theoretic Framework for Sovereign Tactical Anonymity
https://arxiv.org/abs/2512.09954
December 12, 2025 at 7:32 AM
Dinh C. Nguyen, Md Bokhtiar Al Zami, Ratun Rahman, Shaba Shaon, Tuy Tan Nguyen, Fatemeh Afghah
When Quantum Federated Learning Meets Blockchain in 6G Networks
https://arxiv.org/abs/2512.09958
December 12, 2025 at 7:32 AM
Dae-young Kim, Karuna Pande Joshi
TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange
https://arxiv.org/abs/2512.09959
December 12, 2025 at 7:31 AM
Ayush Nainwal, Atharva Kamble, Nitin Awathare
A Comparative Analysis of zk-SNARKs and zk-STARKs: Theory and Practice
https://arxiv.org/abs/2512.10020
December 12, 2025 at 7:31 AM
Shresta B. Seetharam, Mohamed Nabeel, William Melicher
Malicious GenAI Chrome Extensions: Unpacking Data Exfiltration and Malicious Behaviours
https://arxiv.org/abs/2512.10029
December 12, 2025 at 7:30 AM
Anil Kumar Gorthi
Evaluation of Risk and Resilience of the MBTA Green Rapid Transit System
https://arxiv.org/abs/2512.10088
December 12, 2025 at 7:30 AM
Najmul Hassan, Prashanth BusiReddyGari, Haitao Zhao, Yihao Ren, Jinsheng Xu, Shaohu Zhang
LLM-PEA: Leveraging Large Language Models Against Phishing Email Attacks
https://arxiv.org/abs/2512.10104
December 12, 2025 at 7:04 AM
Hubert Djuitcheu, Andrew Sergeev, Khurshid Alam, Danny Santhosh, Achim Autenrieth, Jochen Seitz
Lightweight Security for Private Networks: Real-World Evaluation of WireGuard
https://arxiv.org/abs/2512.10135
December 12, 2025 at 7:04 AM
Yangkun Wang, Jingbo Shang
Watermarks for Language Models via Probabilistic Automata
https://arxiv.org/abs/2512.10185
December 12, 2025 at 7:03 AM
Venkata Tanuja Madireddy
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
https://arxiv.org/abs/2512.10280
December 12, 2025 at 7:03 AM
Md Nahid Hasan Shuvo, Moinul Hossain, Anik Mallik, Jeffrey Twigg, Fikadu Dagefu
FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning
https://arxiv.org/abs/2512.10296
December 12, 2025 at 7:02 AM
Wei Shao, Najmeh Nazari, Behnam Omidi, Setareh Rafatirad, Houman Homayoun, Khaled N. Khasawneh, Chongzhou Fang
Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
https://arxiv.org/abs/2512.10361
December 12, 2025 at 7:02 AM
Yash Srivastava, Shalin Jain, Sneha Awathare, Nitin Awathare
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
https://arxiv.org/abs/2512.10372
December 12, 2025 at 6:39 AM
N Mangala, Murtaza Rangwala, S Aishwarya, B Eswara Reddy, Rajkumar Buyya, KR Venugopal, SS Iyengar, LM Patnaik
Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems
https://arxiv.org/abs/2512.10426
December 12, 2025 at 6:39 AM
Kaleb Bacztub, Braden Vester, Matteo Hodge, Liulseged Abate
Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques
https://arxiv.org/abs/2512.10470
December 12, 2025 at 6:38 AM
Chaomeng Lu, Bert Lagaisse
From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection
https://arxiv.org/abs/2512.10485
December 12, 2025 at 6:38 AM
Vyron Kampourakis, Georgios Kavallieratos, Georgios Spathoulas, Vasileios Gkioulos, Sokratis Katsikas
LLM-Assisted AHP for Explainable Cyber Range Evaluation
https://arxiv.org/abs/2512.10487
December 12, 2025 at 6:37 AM
Han Yang, Shaofeng Li, Tian Dong, Xiangyu Xu, Guangchi Liu, Zhen Ling
Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs
https://arxiv.org/abs/2512.10600
December 12, 2025 at 6:36 AM
David-Alexandre Guiraud, Andrea Tundis, Marc Winstel
Objectives and Design Principles in Offline Payments with Central Bank Digital Currency (CBDC)
https://arxiv.org/abs/2512.10636
December 12, 2025 at 5:09 AM
Neha, Tarunpreet Bhatia
Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
https://arxiv.org/abs/2512.10637
December 12, 2025 at 5:09 AM
Daniyar Kurmankhojayev, Andrei Shadrikov, Dmitrii Gordin, Mikhail Shkorin, Danijar Gabdullin, Aigerim Kambetbayeva, Kanat Kuatov
Virtual camera detection: Catching video injection attacks in remote biometric systems
https://arxiv.org/abs/2512.10653
December 12, 2025 at 5:08 AM
Damilare Peter Oyinloye, Mohd Sameen Chishti, Jingyue Li
A Proof of Success and Reward Distribution Protocol for Multi-bridge Architecture in Cross-chain Communication
https://arxiv.org/abs/2512.10667
December 12, 2025 at 5:08 AM