Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing Technologies Authors: Marc Damie, Mihai Pop, Merijn Posthuma | Published: 2025-08-06 カーボンフットプリント分析環境影響評価通信セキュリティ 2025.08.06 2025.08.08 Literature Database
What If, But Privately: Private Counterfactual Retrieval Authors: Shreya Meel, Mohamed Nomeir, Pasan Dissanayake, Sanghamitra Dutta, Sennur Ulukus | Published: 2025-08-05 Privacy Protection MethodComputational Complexity通信セキュリティ 2025.08.05 2025.08.07 Literature Database
Red-Teaming LLM Multi-Agent Systems via Communication Attacks Authors: Pengfei He, Yupin Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu | Published: 2025-02-20 | Updated: 2025-06-02 Indirect Prompt InjectionEthical Considerations通信セキュリティ 2025.02.20 2025.06.04 Literature Database