117 | -- | 118 | Samia Bouzefrane, Jenny Gabriela Torres Olmedo, Gongxuan Zhang, Nicolas Puech. Security and trust in ubiquitous systems |
119 | -- | 130 | David Jelenc. Toward unified trust and reputation messaging in ubiquitous systems |
131 | -- | 144 | Nour El Madhoun, Julien Hatin, Emmanuel Bertin. A decision tree for building IT applications |
145 | -- | 153 | Lynda Boukela, Gongxuan Zhang, Méziane Yacoub, Samia Bouzefrane 0001, Sajjad Bagheri Baba Ahmadi, Hamed Jelodar. A modified LOF-based approach for outlier characterization in IoT |
155 | -- | 174 | José David Vega Sánchez, Luis Urquiza Aguiar, Martha Cecilia Paredes Paredes, Diana Pamela Moya Osorio. Survey on physical layer security for 5G wireless networks |
175 | -- | 185 | Pawel Laka, Zbigniew Korzeb, Wojciech Mazurczyk. Novel user authentication method based on body composition analysis |
187 | -- | 202 | Abu Shohel Ahmed, Mukesh Thakur, Santeri Paavolainen, Tuomas Aura. Transparency of SIM profiles for the consumer remote SIM provisioning protocol |
203 | -- | 222 | Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle. Towards more secure EMV purchase transactions |
223 | -- | 233 | Kodjo Edem Agbezoutsi, Pascal Urien, Toundé Mesmin Dandjinou. Mobile money traceability and federation using blockchain services |
235 | -- | 253 | Patricio Zambrano, Jenny Torres 0001, Ángel Yánez, Alexandra Macas, Luis Tello-Oquendo. Understanding cyberbullying as an information security attack - life cycle modeling |
255 | -- | 270 | Jorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin L. Sanchez, Gabriel Lopez-Fonseca, Dorys Quiroz. Information security management frameworks and strategies in higher education institutions: a systematic review |