| 14 | -- | 0 | Timothy Dee, Ian Richardson, Akhilesh Tyagi. Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication |
| 15 | -- | 0 | Brian Goncalves, Atefeh Mashatan. Tightly Secure PKE Combiner in the Quantum Random Oracle Model |
| 16 | -- | 0 | Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang, Tao Yuan. Benchmark Analysis of YOLO Performance on Edge Intelligence Devices |
| 17 | -- | 0 | Antonios Patergianakis, Konstantinos Limniotis. Privacy Issues in Stylometric Methods |
| 18 | -- | 0 | Keerthi Nelaturu, Han Du, Duc-Phong Le. A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions |
| 19 | -- | 0 | Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hély. A Memory Hierarchy Protected against Side-Channel Attacks |
| 20 | -- | 0 | Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai. Certificate Management Scheme for VANETs Using Blockchain Structure |
| 21 | -- | 0 | Sara D. Cardell, Verónica Requena, Amparo Fúster-Sabater. Computational Analysis of Interleaving PN-Sequences with Different Polynomials |
| 22 | -- | 0 | Abhrajit Sengupta, Mohammed Nabeel 0001, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu. A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL |
| 23 | -- | 0 | Linir Zamir, Mehrdad Nojoumian. Localized State-Change Consensus in Immense and Highly Dynamic Environments |
| 24 | -- | 0 | Mohammad Almseidin, Mouhammd Alkasassbeh 0001, Maen Alzubi, Jamil Al-Sawwa. Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation |
| 25 | -- | 0 | Binh Kieu-Do-Nguyen, Cuong Pham-Quoc, Ngoc Thinh Tran, Cong-Kha Pham, Trong-Thuc Hoang. Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA |
| 26 | -- | 0 | Alessandro Barenghi, Gioele Falcetti, Gerardo Pelosi. Locating Side Channel Leakage in Time through Matched Filters |
| 27 | -- | 0 | Bartosz Drzazga, Lukasz Krzywiecki. Review of Chosen Isogeny-Based Cryptographic Schemes |
| 28 | -- | 0 | Dina Ibrahim, Kareem Ahmed, Mohamed Abdallah, Abdelmgeid A. Ali. A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix |
| 29 | -- | 0 | Damiano Azzolini, Fabrizio Riguzzi. Probabilistic Logic Models for the Lightning Network |
| 30 | -- | 0 | Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, Trong-Thuc Hoang. ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3 |