Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toยท1hยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.orgยท1h
๐Ÿ”’security
Flag this post
Build your own GPG in Rust
andrewhalle.github.ioยท17hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท12hยท
Discuss: Hacker News
๐ŸŒNetwork Security
Flag this post
Why Your Passcode Should Repeat A Digit
mindyourdecisions.comยท10h
๐Ÿ”’security
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rsยท12hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography in Cross-Silo Model Aggregation
dev.toยท21hยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
Credentials Evidence or Simulate
preludes.euยท10hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Ribbon Targeted in Cyber Espionage Campaign by Nation-State Actors
blogger.comยท17h
๐Ÿ›ก๏ธCybersecurity
Flag this post
A Comparative Study of Hybrid Post-Quantum Cryptographic X.509 Certificate Schemes
arxiv.orgยท1h
๐Ÿ”ŒEmbedded Systems
Flag this post
News for October 2025
ptreview.sublinear.infoยท7h
๐Ÿ”ŒEmbedded Systems
Flag this post
OVHcloud: Quantum random number generation SSL certificates for all customers
blog.ovhcloud.comยท16hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Dive into Systems
diveintosystems.orgยท13hยท
Discuss: Hacker News
โšกSystems Programming
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comยท18h
๐ŸŒNetwork Security
Flag this post
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus
dev.toยท11hยท
Discuss: DEV
๐Ÿ”ŒEmbedded Systems
Flag this post
How Can eLearning Platforms Ensure Data Safety?
elearningindustry.comยท14h
๐ŸŒNetwork Security
Flag this post
Quantum Machine Unlearning: Foundations, Mechanisms, and Taxonomy
arxiv.orgยท1h
๐Ÿ”ŒEmbedded Systems
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.plยท20h
๐Ÿ”’security
Flag this post
EP-HDC: Hyperdimensional Computing with Encrypted Parameters for High-Throughput Privacy-Preserving Inference
arxiv.orgยท1h
๐Ÿ”’security
Flag this post