26 | -- | 0 | Ali Shuja Siddiqui, Yutian Gui, Fareena Saqib. Secure Boot for Reconfigurable Architectures |
27 | -- | 0 | Sylvain Guilley, Khaled Karray, Thomas Perianin, Ritu Ranjan Shrivastwa, Youssef Souissi, Sofiane Takarabt. Side-Channel Evaluation Methodology on Software |
28 | -- | 0 | Yunhong Zhou, Shihui Zheng, Licheng Wang. Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud |
29 | -- | 0 | Bharath K. Samanthula, Divya Karthikeyan, Boxiang Dong, K. Anitha Kumari. ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services |
30 | -- | 0 | Debayan Das, Shreyas Sen. Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach |
31 | -- | 0 | Georgios M. Nikolopoulos, Marc Fischlin. Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources |
32 | -- | 0 | Jeff Nijsse, Alan T. Litchfield. A Taxonomy of Blockchain Consensus Methods |
33 | -- | 0 | Maharage Nisansala Sevwandi Perera, Takeshi Koshiba. Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation |
34 | -- | 0 | Sergey Bezzateev, Vadim Davydov, Aleksandr Ometov. On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication |
35 | -- | 0 | Oleg Evsutin, Kristina Dzhanashia. Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security |
36 | -- | 0 | Rinat Breuer, Itamar Levi. How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost |
37 | -- | 0 | Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa. Statically Aggregate Verifiable Random Functions and Application to E-Lottery |