519 | -- | 529 | Zhouhang Cheng, Haichang Gao, Zhongyu Liu, Huaxi Wu, Yang Zi, Ge Pei. Image-based CAPTCHAs based on neural style transfer |
530 | -- | 540 | Iman Vakilinia, Shamik Sengupta. Fair and private rewarding in a coalitional game of cybersecurity information sharing |
541 | -- | 551 | Dingyu Yan, Feng Liu 0001, Yaqin Zhang, Kun Jia. Dynamical model for individual defence against cyber epidemic attacks |
552 | -- | 558 | Athmane Seghier, Jianxin Li, Dazhi Sun. Advanced encryption standard based on key dependent S-Box cube |
559 | -- | 569 | Samir Hodzic, Enes Pasalic, Yongzhuang Wei. Guess and determine cryptanalysis with variable sampling and its applications |
570 | -- | 578 | Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis. Transforming malicious code to ROP gadgets for antivirus evasion |
579 | -- | 590 | Huiqin Xie, Li Yang. Witness indistinguishability and witness hiding against quantum attacks |
591 | -- | 602 | Kakumani K. C. Deepthi, Kunwar Singh. Cryptanalysis for reduced round Salsa and ChaCha: revisited |
603 | -- | 613 | Deepak Kumar Dalai, Subhamoy Maitra, Santu Pal, Dibyendu Roy 0001. Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs |
614 | -- | 617 | SrinivasaRao SubramanyaRao, Zhi Hu, Chang-An Zhao. Division polynomial-based elliptic curve scalar multiplication revisited |
618 | -- | 638 | Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin. Multi-key homomorphic authenticators |
639 | -- | 648 | Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen. Fully homomorphic encryption based on the ring learning with rounding problem |
649 | -- | 658 | Huidan Hu, Changlu Lin, Chin-Chen Chang 0001, Lanxiang Chen. Enhanced secure data backup scheme using multi-factor authentication |
659 | -- | 669 | Waleed Ali 0001, Adel Ali Ahmed. Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting |
670 | -- | 684 | Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, George Stephanides. Leakage-resilient lattice-based partially blind signatures |
685 | -- | 691 | Yupu Hu, Shanshan Zhang, Jiangshan Chen, Baocang Wang. +14 ABE with weakness analysis |
692 | -- | 702 | Prathiba Ashok, Kanchana Bhaaskaran Vettuvanam Somasundaram. Charge balancing symmetric pre-resolve adiabatic logic against power analysis attacks |
703 | -- | 710 | Jikai Teng, Hongyang Ma. Dynamic asymmetric group key agreement protocol with traitor traceability |