Zobrazeno 1 - 10
of 352
pro vyhledávání: '"BUCHANAN, WILLIAM J."'
Biometric systems, while offering convenient authentication, often fall short in providing rigorous security assurances. A primary reason is the ad-hoc design of protocols and components, which hinders the establishment of comprehensive security proo
Externí odkaz:
http://arxiv.org/abs/2411.17321
Autor:
Sultanow, Eldar, Selimllari, Fation, Dutta, Siddhant, Reese, Barry D., Tehrani, Madjid, Buchanan, William J
Data poisoning attacks on machine learning models aim to manipulate the data used for model training such that the trained model behaves in the attacker's favor. In classical models such as deep neural networks, large chains of dot products do indeed
Externí odkaz:
http://arxiv.org/abs/2410.05145
Over the last decade, Artificial Intelligence (AI) has become increasingly popular, especially with the use of chatbots such as ChatGPT, Gemini, and DALL-E. With this rise, large language models (LLMs) and Generative AI (GenAI) have also become more
Externí odkaz:
http://arxiv.org/abs/2403.08701
The vSPACE experimental proof-of-concept (PoC) on the TrueElect[Anon][Creds] protocol presents a novel approach to secure, private, and scalable elections, extending the TrueElect and ElectAnon protocols with the integration of AnonCreds SSI (Self-So
Externí odkaz:
http://arxiv.org/abs/2403.05275
Autor:
Kasimatis, Dimitrios, Grierson, Sam, Buchanan, William J., Eckl, Chris, Papadopoulos, Pavlos, Pitropakis, Nikolaos, Thomson, Craig, Ghaleb, Baraq
Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de
Externí odkaz:
http://arxiv.org/abs/2403.05271
Autor:
Pasumarthy, Lakshmi Rama Kiran, Ali, Hisham, Buchanan, William J, Ahmad, Jawad, Josang, Audun, Mavroeidis, Vasileios, Lemoudden, Mouad
There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., the
Externí odkaz:
http://arxiv.org/abs/2403.05210
Autor:
Khan, Muhammad Shahbaz, Ahmad, Jawad, Al-Dubai, Ahmed, Ghaleb, Baraq, Pitropakis, Nikolaos, Buchanan, William J.
Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight
Externí odkaz:
http://arxiv.org/abs/2401.04707
Autor:
Sultanow, Eldar, Amir, Malik, Jeschke, Anja, Tfiha, Amir Darwish, Tehrani, Madjid, Buchanan, William J
Let $p$ and $q$ be two distinct odd primes, $p
Externí odkaz:
http://arxiv.org/abs/2401.00215
Autor:
Khan, Muhammad Shahbaz, Ahmad, Jawad, Al-Dubai, Ahmed, Jaroucheh, Zakwan, Pitropakis, Nikolaos, Buchanan, William J.
Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based perm
Externí odkaz:
http://arxiv.org/abs/2311.02795
In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of se
Externí odkaz:
http://arxiv.org/abs/2310.05032