26 | -- | 0 | Julian Danner, Martin Kreuzer. A Fault Attack on the Family of Enocoro Stream Ciphers |
27 | -- | 0 | Mohammad Anagreh, Peeter Laud, Eero Vainikko. Parallel Privacy-Preserving Shortest Path Algorithms |
28 | -- | 0 | Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin 0001, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun. Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach |
29 | -- | 0 | Irene Ioannidou, Nicolas Sklavos 0001. On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications |
30 | -- | 0 | Bang Yuan Chong, Iftekhar Salam. Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms |
31 | -- | 0 | Alessandro Budroni, Qian Guo 0001, Thomas Johansson 0001, Erik Mårtensson, Paul Stankovski Wagner. Improvements on Making BKW Practical for Solving LWE |
32 | -- | 0 | Emad Hamadaqa, Saleh Mulhem, Wael Adi, Mladen Berekovic. Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies |
33 | -- | 0 | Johann-Philipp Thiers, Jürgen Freudenberger. Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography |
34 | -- | 0 | Konstantinos Limniotis. Cryptography as the Means to Protect Fundamental Human Rights |
35 | -- | 0 | K. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee. ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks |
36 | -- | 0 | Diego Romano, Giovanni Schmid. Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology |
37 | -- | 0 | Noha Ezzat El-Attar, Doaa S. El-Morshedy, Wael A. Awad. A New Hybrid Automated Security Framework to Cloud Storage System |
38 | -- | 0 | Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan. Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions |