| 1 | -- | 58 | Suryateja S. Pericherla. Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art |
| 59 | -- | 71 | Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani. A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware |
| 73 | -- | 81 | Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi. Hierarchical Deterministic Wallets for Secure Steganography in Blockchain |
| 83 | -- | 95 | Ali Khosravi, Taraneh Eghlidos. Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm |
| 97 | -- | 110 | Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh. Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT |
| 111 | -- | 124 | Mahdi Sajadieh, Arash Mirzaei. 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices |
| 125 | -- | 135 | Mohammad Ebrahim Ebrahimi Kiasari, Nasrollah Pakniat, Abdolrasoul Mirghadri, Mojtaba Nazari. A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem |
| 137 | -- | 151 | Bahram Rashidi. Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers |