203 | -- | 233 | Ken Naganuma, Masayuki Yoshino, Noboru Kunihiro, Atsuo Inoue, Yukinori Matsuoka, Mineaki Okazaki. Post-quantum zk-SNARKs from QAPs |
234 | -- | 264 | Nan Wang, Yuqin Luo, Hao Liu, Haibo Tian. A user transaction privacy protection protocol supporting regulations on account-based blockchain |
265 | -- | 291 | Devender Kumar, Deepak Kumar Sharma, Parth Jain, Sumit Bhati, Amit Kumar. Cryptanalysis and improvement of a secure communication protocol for smart healthcare system |
292 | -- | 332 | Kalyani Nikhilesh Pampattiwar, Pallavi Vijay Chavan. Blockchain-based composite access control and secret sharing-based data distribution for security-aware deployments |
333 | -- | 350 | T. E. Jisha, Thomas Monoth. Contrast enhancement in probabilistic visual cryptography schemes: a pixel count based approach |
351 | -- | 366 | Lu Zhang, Yan Sun, Yingfei Xu, Hongfeng Zhu. IDMS quantum password-authenticated key exchange protocols |
367 | -- | 403 | Emmanuel Adu-Mensah, Solomon Odei-Appiah, Joseph Kwame Adjei, Enoch Ayivor. The role of user awareness in the information technology and security governance nexus - evidence from Ghana's banking industry |