
Sign up to save your podcasts
Or


Development and analysis of a secured VoIP system for surveillance
Repairing vulnerabilities without invisible hands. A differentiated
Characterizing the Sensitivity to Individual Bit Flips in Client-Side
Testbed and Software Architecture for Enhancing Security in Industrial
An Open-source Implementation and Security Analysis of Triad's TEE
Collusion Resistant DNS With Private Information Retrieval
Text2VLM: Adapting Text-Only Datasets to Evaluate Alignment Training in
Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on
A Novel Post-Quantum Secure Digital Signature Scheme Based on Neural
Program Analysis for High-Value Smart Contract Vulnerabilities:
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for
MPC-EVM: Enabling MPC Execution by Smart Contracts In An Asynchronous
VDGraph: A Graph-Theoretic Approach to Unlock Insights from SBOM and SCA
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuDevelopment and analysis of a secured VoIP system for surveillance
Repairing vulnerabilities without invisible hands. A differentiated
Characterizing the Sensitivity to Individual Bit Flips in Client-Side
Testbed and Software Architecture for Enhancing Security in Industrial
An Open-source Implementation and Security Analysis of Triad's TEE
Collusion Resistant DNS With Private Information Retrieval
Text2VLM: Adapting Text-Only Datasets to Evaluate Alignment Training in
Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on
A Novel Post-Quantum Secure Digital Signature Scheme Based on Neural
Program Analysis for High-Value Smart Contract Vulnerabilities:
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for
MPC-EVM: Enabling MPC Execution by Smart Contracts In An Asynchronous
VDGraph: A Graph-Theoretic Approach to Unlock Insights from SBOM and SCA
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>