12 | -- | 0 | Michel A. Kinsy, Lake Bu, Mihailo Isakov, Miguel Mark. Designing Secure Heterogeneous Multicore Systems from Untrusted Components |
13 | -- | 0 | Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser 0001. † |
14 | -- | 0 | Balaji Chandrasekaran, Ramadoss Balakrishnan. An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments |
15 | -- | 0 | Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic. An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays |
16 | -- | 0 | Maria Isabel Gonzalez Vasco, Angela Robinson, Rainer Steinwandt. n |
17 | -- | 0 | Sadman Sakib, Preeti Kumari, B. M. S. Bahar Talukder, Md. Tauhidur Rahman, Biswajit Ray. † |
18 | -- | 0 | Juha Partala. Provably Secure Covert Communication on Blockchain |
19 | -- | 0 | Andreas Vogt 0001. Special Issue on Cryptographic Protocols |
20 | -- | 0 | Taimour Wehbe, Vincent John Mooney III, David C. Keezer. Hardware-Based Run-Time Code Integrity in Embedded Devices |
21 | -- | 0 | Jim Plusquellic, Matthew Areno. Correlation-Based Robust Authentication (Cobra) Using Helper Data Only |
22 | -- | 0 | Yunxi Guo, Timothy Dee, Akhilesh Tyagi. Barrel Shifter Physical Unclonable Function Based Encryption |
23 | -- | 0 | Sadiel de la Fe, Carles Ferrer 0001. k |
24 | -- | 0 | Joy Jo-Yi Chang, Bo-Yuan Huang, Justie Su-tzu Juan. A New Visual Multi-Secrets Sharing Scheme by Random Grids |
25 | -- | 0 | Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub 0001. N) |
26 | -- | 0 | William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj. Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers |