Tootfinder

Opt-in global Mastodon full text search. Join the index!

@arXiv_csCR_bot@mastoxiv.page
2025-08-28 09:34:41

Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
Onyinye Okoye
arxiv.org/abs/2508.19465

@arXiv_csLG_bot@mastoxiv.page
2025-08-29 10:28:11

Practical Physical Layer Authentication for Mobile Scenarios Using a Synthetic Dataset Enhanced Deep Learning Approach
Yijia Guo, Junqing Zhang, Y. -W. Peter Hong
arxiv.org/abs/2508.20861

@arXiv_eessSP_bot@mastoxiv.page
2025-08-28 09:43:41

Cell-Free Massive MIMO-Based Physical-Layer Authentication
Isabella W. G. da Silva, Zahra Mobini, Hien Quoc Ngo, Michail Matthaiou
arxiv.org/abs/2508.19931

@mgorny@social.treehouse.systems
2025-08-28 12:43:04

Really grateful for two factor authentication via email. Nothing better than being unable to sign in to your account because your mail provider is having downtime.

@rigo@mamot.fr
2025-07-28 08:25:19

Microsoft now has invented the 10 Factor authentication before you get to a teams. Next: You need to photograph your underwear and send it to them.

@fanf@mendeddrum.org
2025-08-24 08:42:03

from my link log —
Cracking the Vault: flaws in authentication, identity, and authorization in HashiCorp Vault.
cyata.ai/blog/cracking-the-vau

@arXiv_csCV_bot@mastoxiv.page
2025-08-29 10:37:31

First-Place Solution to NeurIPS 2024 Invisible Watermark Removal Challenge
Fahad Shamshad, Tameem Bakr, Yahia Shaaban, Noor Hussein, Karthik Nandakumar, Nils Lukas
arxiv.org/abs/2508.21072

@arXiv_csCR_bot@mastoxiv.page
2025-08-28 09:46:21

Addressing Deepfake Issue in Selfie banking through camera based authentication
Subhrojyoti Mukherjee, Manoranjan Mohanty
arxiv.org/abs/2508.19714

@stf@chaos.social
2025-06-27 08:56:06

huh, i just found this. it is clearly llm generated, and thus riddled with inaccuracies and hallucinations. but on first glance, i am very much impressed by the stuff that doesn't immediately jump at me as wrong: deepwiki.com/stef/libopaque and

@Techmeme@techhub.social
2025-08-13 00:25:54

1Kosmos, which provides identity verification and passwordless authentication software, raised a $57M Series B, including a $10M line of credit (Duncan Riley/SiliconANGLE)
siliconangle.com/2025/08/12/1k

@arXiv_csCR_bot@mastoxiv.page
2025-08-27 08:51:43

Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication
Yaser Baseri, Abdelhakim Senhaji Hafid, Dimitrios Makrakis, Hamidreza Fereidouni
arxiv.org/abs/2508.18453

@arXiv_csRO_bot@mastoxiv.page
2025-06-18 08:43:55

Haptic-Based User Authentication for Tele-robotic System
Rongyu Yu, Kan Chen, Zeyu Deng, Chen Wang, Burak Kizilkaya, Liying Emma Li
arxiv.org/abs/2506.14116

@arXiv_csCR_bot@mastoxiv.page
2025-08-26 09:18:56

A Survey of Threats Against Voice Authentication and Anti-Spoofing Systems
Kamel Kamel, Keshav Sood, Hridoy Sankar Dutta, Sunil Aryal
arxiv.org/abs/2508.16843

@newsie@darktundra.xyz
2025-06-26 14:18:40

Israeli cyber and computer science experts phished by Iran-linked APT42 therecord.media/israel-cyber-e

@arXiv_csHC_bot@mastoxiv.page
2025-07-09 08:42:52

NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones
Aiur Nanzatov, Lourdes Pe\~na-Castillo, Oscar Meruvia-Pastor
arxiv.org/abs/2507.05447

@arXiv_csAR_bot@mastoxiv.page
2025-08-26 07:32:07

zkPHIRE: A Programmable Accelerator for ZKPs over HIgh-degRee, Expressive Gates
Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt B\"unz, Siddharth Garg, Brandon Reagen
arxiv.org/abs/2508.16738

@tezoatlipoca@mas.to
2025-06-20 16:54:47

"In the grim darkness of the far future, there is only two factor authentication..."

@arXiv_csCR_bot@mastoxiv.page
2025-06-25 08:52:00

ZK-SERIES: Privacy-Preserving Authentication using Temporal Biometric Data
Daniel Reijsbergen, Eyasu Getahun Chekole, Howard Halim, Jianying Zhou
arxiv.org/abs/2506.19393

@lukem@hachyderm.io
2025-06-20 23:39:18

I was wondering why my SMTP configuration wouldn't work. DNS zone looked fine, SSL/TLS settings correct, authentication enabled, yet it wouldn't budge.
Then I had a moment of enlightenment about the mail subdomain having one lone A record instead of two NS records as it should have been.
It's. ALWAYS. DNS. Dammit.

@kurtsh@mastodon.social
2025-08-20 01:27:56

SOMEONE'S GONNA GET HAAAACKED still unpatched after 6 months...
Original post: #cybersecurity

@arXiv_csCR_bot@mastoxiv.page
2025-08-26 11:22:46

PRZK-Bind: A Physically Rooted Zero-Knowledge Authentication Protocol for Secure Digital Twin Binding in Smart Cities
Yagmur Yigit, Mehmet Ali Erturk, Kerem Gursu, Berk Canberk
arxiv.org/abs/2508.17913

@aral@mastodon.ar.al
2025-06-13 12:21:29

Capitalism − Big Tech − single points of failure mas.to/@nemo/11467600324860988

@arXiv_quantph_bot@mastoxiv.page
2025-08-11 10:05:59

Design and analysis of a set of discrete variable protocols for secure quantum communication
Arindam Dutta
arxiv.org/abs/2508.06380 arxiv.o…

@arXiv_csSE_bot@mastoxiv.page
2025-07-23 09:08:42

Making REST APIs Agent-Ready: From OpenAPI to Model Context Protocol Servers for Tool-Augmented LLMs
Meriem Mastouri, Emna Ksontini, Wael Kessentini
arxiv.org/abs/2507.16044

@arXiv_csCR_bot@mastoxiv.page
2025-07-24 09:38:09

Active Attack Resilience in 5G: A New Take on Authentication and Key Agreement
Nazatul H. Sultan, Xinlong Guan, Josef Pieprzyk, Wei Ni, Sharif Abuadbba, Hajime Suzuki
arxiv.org/abs/2507.17491

@davidaugust@mastodon.online
2025-07-14 01:46:15

Today’s Sesame Street episode is brought to you by the letter X, the platform that cannot be trusted…
…and is also brought to you by the number 2, for 2-factor-authentication and the word “cybersecurity!”
Remember kids, never give an elongated muskrat access to your brand identity!

@UP8@mastodon.social
2025-07-18 19:01:12

😎 Edible microlasers made from food-safe materials can serve as barcodes and biosensors
#optics

@arXiv_csCR_bot@mastoxiv.page
2025-08-28 09:29:41

Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks
Kangfeng Ye, Roberto Metere, Jim Woodcock, Poonam Yadav
arxiv.org/abs/2508.19430

@robpike@hachyderm.io
2025-07-12 00:39:11

GMail:
"Be careful with this message.
This message appears to be sent from your account but Gmail couldn't verify this. Someone might be impersonating your account. If you're not sure the message is from you, use caution when clicking links, downloading attachments, or replying with personal information."
I sent it while logged in to GMail using multiple authentication steps from my home network using a secure laptop. What are they talking about? Serious question: how could they not verify it? It's either an idiotic engineering problem on their end or I'm terrified that security is meaningless. Probably both.

@rene_mobile@infosec.exchange
2025-08-15 07:01:49

I am very happy to announce that our big architecture paper for the Digidow project on distributed digital identity systems with biometric authentication for physical interaction is now online on arXiv: arxiv.org/abs/2508.10185.
While it can't have all the details, it summarizes the main de…

@joxean@mastodon.social
2025-06-12 10:16:07

Do I know anyone using /e/OS? I'm interested in knowing if you can do:
* Two factors authentication with Gmail (the usual "a notification has been sent to your mobile, tap Yes bla, bla, bla").
* Paying using contactless methods?
Also, I would like to know about any other possible problems I might have switching from #android to /e/OS.

@midtsveen@social.linux.pizza
2025-05-31 19:32:40

@…
"2FA Liberapay does not yet support two-factor authentication."
When!? 🤦
#LiberaPay #Privacy

Screenshot of the Liberapay account settings page showing options for changing the password and a placeholder for two-factor authentication (2FA), which is not yet available on the platform.
@Techmeme@techhub.social
2025-06-19 00:10:59

Meta is adding support for passkeys on Facebook's iOS and Android apps "soon", and will begin rolling out passkeys to Messenger "in the coming months" (Emma Roth/The Verge)
theverge.com/news/689410/faceb

@deepthoughts10@infosec.exchange
2025-08-13 02:51:40

Because FIDO-based authentication (Passkeys, YubiKeys, etc.) is so good the only way around it is to trick someone into not using it. That's essentially what a downgrade attack is. As a Microsoft #EntraID administrator you can prevent successful downgrade attack from affecting your users. Here's a few ways to mitigate the risk of downgrade attacks:
1) Have your users delete all MF…

@lil5@social.linux.pizza
2025-06-02 07:34:26

Turns out #synology 's home folders are set to chmod 777 by default!
blog.aaronlenoir.com/2018/05/0

@arXiv_csNI_bot@mastoxiv.page
2025-07-22 10:09:10

Beyond DNS: Unlocking the Internet of AI Agents via the NANDA Index and Verified AgentFacts
Ramesh Raskar, Pradyumna Chari, John Zinky, Mahesh Lambe, Jared James Grogan, Sichao Wang, Rajesh Ranjan, Rekha Singhal, Shailja Gupta, Robert Lincourt, Raghu Bala, Aditi Joshi, Abhishek Singh, Ayush Chopra, Dimitris Stripelis, Bhuwan B, Sumit Kumar, Maria Gorskikh

@fanf@mendeddrum.org
2025-08-09 14:42:03

from my link log —
How attackers are still phishing "phishing-resistant" passkey authentication.
bleepingcomputer.com/news/secu

@nemobis@mamot.fr
2025-07-10 07:25:06

Finnish bank fails to send #email to me, finally succeeds to a different address but
Authentication-Results: mx.mail.ovh.net;
arc=fail (as.1.microsoft.com=pass, ams.1.microsoft.com=fail (body has been altered)) smtp.remote-ip=a.b.c.d;
Now this inspires confidence. /s
#Microsoft

@arXiv_csCR_bot@mastoxiv.page
2025-08-26 10:46:17

ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
Shayesta Naziri, Xu Wang, Guangsheng Yu, Christy Jie Liang, Wei Ni
arxiv.org/abs/2508.17043

@lightweight@mastodon.nzoss.nz
2025-07-02 04:21:19

Currently working on implementing Matrix's new 'Matrix Authentication Service' for our NZ-based instance... non-trivial. But it's such an impressive system (it's doing far more than competitors like Salesforce Slack and Microsoft Teams).

@laf0rge@chaos.social
2025-06-30 05:46:41

lT security 101: Don't leave your company laptop with authentication smart card inserted, applications open and without screensaver at your seat when using the lavatories on a train. Unbelivable...

@arXiv_csLG_bot@mastoxiv.page
2025-08-20 10:15:00

A Comprehensive Re-Evaluation of Biometric Modality Properties in the Modern Era
Rouqaiah Al-Refai, Pankaja Priya Ramasamy, Ragini Ramesh, Patricia Arias-Cabarcos, Philipp Terh\"orst
arxiv.org/abs/2508.13874

@samir@functional.computer
2025-06-03 18:33:18

@… I can think of ways you might do it by getting people to set a DNS CNAME, for example, so they own the domain *but* authentication is controlled by a service. In theory, this allows ownership because you can replace it with a competitor.
AP is probably harder, but I don't think it's impossible, based on my cursory reading of the …

@arXiv_csCR_bot@mastoxiv.page
2025-06-24 12:03:00

Physical Layer Challenge-Response Authentication between Ambient Backscatter Devices
Yifan Zhang, Yongchao Dang, Masoud Kaveh, Zheng Yan, Riku J\"antti, Zhu Han
arxiv.org/abs/2506.18767

@Techmeme@techhub.social
2025-06-16 12:15:38

A whistleblower provides nonpublic data revealing that 1M 2FA SMS messages from June 2023 passed via Fink Telecom, a small Swiss company linked to spy agencies (Bloomberg)

@sauer_lauwarm@mastodon.social
2025-07-01 08:50:38

Ja, krunchyfoods.in, dir vertraue ich ganz bestimmt meine Kreditkarteninformation zur Aktivierung der 2-Factor-Authentication auf einem Zahlungsdienst an, den ich nicht verwende.

@arXiv_csIT_bot@mastoxiv.page
2025-06-13 07:55:30

Anomaly Detection for Sensing Security
Stefan Roth, Aydin Sezgin
arxiv.org/abs/2506.10718 arxiv.org/pdf/2506.10718

@sean@scoat.es
2025-07-31 22:17:14

It sounds like that Tea app vulnerability (not the one where they had data just open to the world on Firebase, but a second problem) is what I describe in the first paragraph of this post.
You *can’t* rely on user-controlled devices to safely hold credentials that work for more than that one user—especially if the credentials live outside of something like a hardware security module, which they almost certainly do if your app is storing them.

@arXiv_csCR_bot@mastoxiv.page
2025-08-19 10:27:50

The Passwordless Authentication with Passkey Technology from an Implementation Perspective
Lien Tran, Boyuan Zhang, Ratchanon Pawanja, Rashid Hussain Khokhar
arxiv.org/abs/2508.11928

@arXiv_csCR_bot@mastoxiv.page
2025-06-23 09:58:40

Physical-Layer Signal Injection Attacks on EV Charging Ports: Bypassing Authentication via Electrical-Level Exploits
Hetian Shi, Yi He, Shangru Song, Jianwei Zhuge, Jian Mao
arxiv.org/abs/2506.16400

@groupnebula563@mastodon.social
2025-07-03 20:20:00

remember when you could do this and just have free #WiFi

A “join other network” pop up on an iPhone. The network name entered in is “linksys” and the authentication method selected is “None”
@arXiv_eessSP_bot@mastoxiv.page
2025-07-08 12:04:01

A Federated Learning-based Lightweight Network with Zero Trust for UAV Authentication
Hao Zhang, Fuhui Zhou, Wei Wang, Qihui Wu, Chau Yuen
arxiv.org/abs/2507.05111

@arXiv_csCV_bot@mastoxiv.page
2025-08-13 10:21:02

Deep Learning Models for Robust Facial Liveness Detection
Oleksandr Kuznetsov, Emanuele Frontoni, Luca Romeo, Riccardo Rosati, Andrea Maranesi, Alessandro Muscatello
arxiv.org/abs/2508.09094

@arXiv_csCR_bot@mastoxiv.page
2025-08-20 09:39:40

Know Me by My Pulse: Toward Practical Continuous Authentication on Wearable Devices via Wrist-Worn PPG
Wei Shao, Zequan Liang, Ruoyu Zhang, Ruijie Fang, Ning Miao, Ehsan Kourkchi, Setareh Rafatirad, Houman Homayoun, Chongzhou Fang
arxiv.org/abs/2508.13690

@bmariusz@techhub.social
2025-07-11 17:07:58

Day 16
Just published a deep dive into building a secure login page with Next.js, NestJS, JWT, and PostgreSQL.
- Email verification
- Role-based access control
- Subscription enforcement
- Token decoding in frontend
- SQL-level inserts for system roles
Includes full code snippets and explanation of the entire flow.
Perfect if you're working on full-stack apps with JavaScript, TypeScript, and SQL.

@arXiv_csDC_bot@mastoxiv.page
2025-07-02 08:52:00

DynoStore: A wide-area distribution system for the management of data over heterogeneous storage
Dante D. Sanchez-Gallegos, J. L. Gonzalez-Compean, Maxime Gonthier, Valerie Hayot-Sasson, J. Gregory Pauloski, Haochen Pan, Kyle Chard, Jesus Carretero, Ian Foster
arxiv.org/abs/2507.00576

@arXiv_csHC_bot@mastoxiv.page
2025-08-13 08:38:12

AirSignatureDB: Exploring In-Air Signature Biometrics in the Wild and its Privacy Concerns
Marta Robledo-Moreno, Ruben Vera-Rodriguez, Ruben Tolosana, Javier Ortega-Garcia, Andres Huergo, Julian Fierrez
arxiv.org/abs/2508.08502

@arXiv_csSD_bot@mastoxiv.page
2025-07-31 07:58:11

Quantum-Inspired Audio Unlearning: Towards Privacy-Preserving Voice Biometrics
Shreyansh Pathak, Sonu Shreshtha, Richa Singh, Mayank Vatsa
arxiv.org/abs/2507.22208

@arXiv_csCR_bot@mastoxiv.page
2025-06-18 08:28:24

Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
arxiv.org/abs/2506.12802

@arXiv_quantph_bot@mastoxiv.page
2025-08-11 09:59:49

Secure Hybrid Key Growing via Coherence Witnessing and Bipartite Encoding
Pol Juli\`a Farr\'e, Chris Aaron Schneider, Christian Deppe
arxiv.org/abs/2508.06294

@arXiv_csCR_bot@mastoxiv.page
2025-06-17 09:50:25

Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
arxiv.org/abs/2506.12802

@qbi@freie-re.de
2025-06-09 06:27:08

Nutzt du Client Authentication mit TLS-Zertifikaten?
#TLS #letsencrypt #EKU #X509

@frankel@mastodon.top
2025-06-13 08:15:00

Exposing #OTelCollector in #Kubernetes with #GatewayAPI & #mTLS

@arXiv_csCV_bot@mastoxiv.page
2025-07-10 07:52:21

Advancing Offline Handwritten Text Recognition: A Systematic Review of Data Augmentation and Generation Techniques
Yassin Hussein Rassul, Aram M. Ahmed, Polla Fattah, Bryar A. Hassan, Arwaa W. Abdulkareem, Tarik A. Rashid, Joan Lu
arxiv.org/abs/2507.06275

@arXiv_csCR_bot@mastoxiv.page
2025-08-14 07:33:52

VeriPHY: Physical Layer Signal Authentication for Wireless Communication in 5G Environments
Clifton Paul Robinson, Salvatore D'Oro, Tommaso Melodia
arxiv.org/abs/2508.09213

@arXiv_csSE_bot@mastoxiv.page
2025-06-03 07:33:40

An LLM Agent for Functional Bug Detection in Network Protocols
Mingwei Zheng, Chengpeng Wang, Xuwei Liu, Jinyao Guo, Shiwei Feng, Xiangyu Zhang
arxiv.org/abs/2506.00714

@arXiv_csCR_bot@mastoxiv.page
2025-08-14 08:47:22

Perfect message authentication codes are robust to small deviations from uniform key distributions
Boris Ryabko
arxiv.org/abs/2508.09783 ar…

@arXiv_csCR_bot@mastoxiv.page
2025-07-17 08:00:10

Challenges in GenAI and Authentication: a scoping review
Wesley dos Reis Bezerra, Lais Machado Bezerra, Carlos Becker Westphall
arxiv.org/abs/2507.11775

@arXiv_csCR_bot@mastoxiv.page
2025-07-24 12:45:42

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
Christopher Battarbee, Christoph Striecks, Ludovic Perret, Sebastian Ramacher, Kevin Verhaeghe

@arXiv_csNI_bot@mastoxiv.page
2025-07-01 09:23:33

Wireless Home Automation Using Social Networking Websites
Divya Alok Gupta, Dwith Chenna, B. Aditya Vighnesh Ramakanth
arxiv.org/abs/2506.22482

@bmariusz@techhub.social
2025-06-06 12:35:58

Day 4
TL;DR: Full Swagger docs JWT auth with registration and login are live.
Today’s work focused on two key improvements.
1. Swagger documentation was extended across all API layers. DTOs, entities, and controllers were enriched with `@ApiTags`, `@ApiOperation`, `@ApiResponse`, and detailed `@ApiBody` annotations — including real-life examples for request bodies.
2. JWT-based authentication was implemented. A secure registration flow was added, with password hashi…

@arXiv_eessSP_bot@mastoxiv.page
2025-06-06 07:24:03

Noise-Driven AI Sensors: Secure Healthcare Monitoring with PUFs
Christiana Chamon, Abhijit Sarkar, A. Lynn Abbott
arxiv.org/abs/2506.05135

@arXiv_csCR_bot@mastoxiv.page
2025-07-24 07:36:49

Building a robust OAuth token based API Security: A High level Overview
Senthilkumar Gopal
arxiv.org/abs/2507.16870 arxiv.org/pdf/2507.1687…

@michabbb@social.vivaldi.net
2025-05-29 19:32:53

#4 👥 Leverage built-in authentication with #Breeze, #Fortify or #Jetstream
🗝️ Store passwords securely using

@arXiv_csCR_bot@mastoxiv.page
2025-06-16 07:32:09

DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond
Guanjie Li, Tom H. Luan, Chengzhe Lai, Jinkai Zheng, Rongxing Lu
arxiv.org/abs/2506.11669

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:18:28

Next Generation Authentication for Data Spaces: An Authentication Flow Based On Grant Negotiation And Authorization Protocol For Verifiable Presentations (GNAP4VP)
Rodrigo Men\'endez, Andres Munoz-Arcentales, Joaqu\'in Salvach\'ua, Carlos Aparicio, Irene Plaza, Gabriel Huecas
arxiv.org/abs/2505.24698

@arXiv_csCR_bot@mastoxiv.page
2025-08-14 08:31:42

Social-Sensor Identity Cloning Detection Using Weakly Supervised Deep Forest and Cryptographic Authentication
Ahmed Alharbi, Hai Dong, Xun Yi
arxiv.org/abs/2508.09665

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:18:57

Authentication and authorization in Data Spaces: A relationship-based access control approach for policy specification based on ODRL
Irene Plaza-Ortiz, Andres Munoz-Arcentales, Joaqu\'in Salvach\'ua, Carlos Aparicio, Gabriel Huecas, Enrique Barra
arxiv.org/abs/2505.24742

@arXiv_csCR_bot@mastoxiv.page
2025-06-12 07:30:51

Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice
Junqing Zhang, Francesco Ardizzon, Mattia Piana, Guanxiong Shen, Stefano Tomasin
arxiv.org/abs/2506.09807

@arXiv_csCR_bot@mastoxiv.page
2025-08-19 11:43:00

AuthenTree: A Scalable MPC-Based Distributed Trust Architecture for Chiplet-based Heterogeneous Systems
Ishraq Tashdid, Tasnuva Farheen, Sazadur Rahman
arxiv.org/abs/2508.13033

@arXiv_csCR_bot@mastoxiv.page
2025-08-05 12:01:31

SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning
S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka
arxiv.org/abs/2508.02438

@arXiv_csCR_bot@mastoxiv.page
2025-06-17 09:39:51

MEraser: An Effective Fingerprint Erasure Approach for Large Language Models
Jingxuan Zhang, Zhenhua Xu, Rui Hu, Wenpeng Xing, Xuhong Zhang, Meng Han
arxiv.org/abs/2506.12551

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 09:56:25

This arxiv.org/abs/2405.12042 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csCR_bot@mastoxiv.page
2025-06-12 07:25:11

Identity and Access Management for the Computing Continuum
Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, Vasilios A. Siris, Nikos Fotiou, George C. Polyzos, Eduardo C\'anovas Mart\'inez, Antonio Skarmeta
arxiv.org/abs/2506.09559

@arXiv_csCR_bot@mastoxiv.page
2025-07-08 12:54:11

README: Robust Error-Aware Digital Signature Framework via Deep Watermarking Model
Hyunwook Choi, Sangyun Won, Daeyeon Hwang, Junhyeok Choi
arxiv.org/abs/2507.04495

@arXiv_csCR_bot@mastoxiv.page
2025-07-10 08:03:01

A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE
Abel C. H. Chen
arxiv.org/abs/2507.06244

@arXiv_csCR_bot@mastoxiv.page
2025-08-05 18:07:34

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- Privacy-Enhanced Adaptive Authentication: User Profiling with Privacy Guarantees
Yaser Baseri, Abdelhakim Senhaji Hafid, Dimitrios Makrakis

@arXiv_csCR_bot@mastoxiv.page
2025-05-30 09:53:39

This arxiv.org/abs/2505.19301 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csCR_bot@mastoxiv.page
2025-07-02 08:24:50

Cyber Attacks Detection, Prevention, and Source Localization in Digital Substation Communication using Hybrid Statistical-Deep Learning
Nicola Cibin, Bas Mulder, Herman Carstens, Peter Palensky, Alexandru \c{S}tefanov
arxiv.org/abs/2507.00522

@arXiv_csCR_bot@mastoxiv.page
2025-07-30 10:22:41

GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection
Hyeong Seon Kim, Huy Kang Kim
arxiv.org/abs/2507.21640

@arXiv_csCR_bot@mastoxiv.page
2025-07-30 10:19:02

Digital identity management system with blockchain:An implementation with Ethereum and Ganache
Andr\'e Davi Lopes, Tais Mello, Wesley dos Reis Bezerra
arxiv.org/abs/2507.21398