| 48 | -- | 0 | Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer. Post Quantum Design in SPDM for Device Authentication and Key Establishment |
| 49 | -- | 0 | Chia-Hui Wang, Chih-Hao Hsu. Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market |
| 50 | -- | 0 | Alfonso B. Labao, Henry N. Adorna. Cryptographic Rational Secret Sharing Schemes over General Networks |
| 51 | -- | 0 | Macarena C. Martínez-Rodríguez, Luis F. Rojas-Muñoz, Eros Camacho-Ruiz, Santiago Sánchez-Solano, Piedad Brox. Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems |
| 52 | -- | 0 | Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré. ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol |
| 53 | -- | 0 | Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis. WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations |
| 54 | -- | 0 | Thijs Veugen, Bart Kamphorst, Michiel Marcus. Privacy-Preserving Contrastive Explanations with Local Foil Trees |
| 55 | -- | 0 | Carlisle Adams. Improving User Privacy in Identity-Based Encryption Environments |
| 56 | -- | 0 | Harshana Bandara, Yasitha Herath, Thushara Weerasundara, Janaka Alawatugoda. On Advances of Lattice-Based Cryptographic Schemes and Their Implementations |
| 57 | -- | 0 | Alexander Kudzin, Kentaroh Toyoda, Satoshi Takayama, Atsushi Ishigame. Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures |
| 58 | -- | 0 | Mario Ciampi, Diego Romano, Giovanni Schmid. Process Authentication through Blockchain: Three Case Studies |
| 59 | -- | 0 | Jim Plusquellic. Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA |
| 60 | -- | 0 | Guangwei Zhao, Kaveh Shamsi. Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation |
| 61 | -- | 0 | Tao Feng 0007, Jiewen Si. Certificateless Searchable Encryption Scheme in Multi-User Environment |
| 62 | -- | 0 | Sneha Chauhan, Sugata Gangopadhyay, Aditi Kar Gangopadhyay. Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio |
| 63 | -- | 0 | Anant Sujatanagarjuna, Arne Bochem, Benjamin Leiding. Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as an ACME Extension for Fast Certificate Revocation |
| 64 | -- | 0 | Quan Zhou, Zhikang Zeng, Kemeng Wang, Menglong Chen. Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection |
| 65 | -- | 0 | Frederick Stock, Yesem Kurt Peker, Alfredo J. Perez, Jarel Hearst. Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things |