1 | -- | 0 | Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev 0001, Tommi Mikkonen, Yevgeni Koucheryavy. Multi-Factor Authentication: A Survey |
3 | -- | 0 | Dimitrios Alvanos, Konstantinos Limniotis, Stavros Stavrou. On the Cryptographic Features of a VoIP Service |
4 | -- | 0 | Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS |
5 | -- | 0 | Jani Suomalainen, Adrian Kotelba, Jari Kreku, Sami Lehtonen. Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT |
6 | -- | 0 | Bertrand Cambou, Paul G. Flikkema, James Palmer, Donald Telesca, Christopher Philabaum. Can Ternary Computing Improve Information Assurance? |