| 115 | -- | 136 | Fatemeh Pirmoradian, Mohammad Dakhilalian, Masoumeh Safkhani. ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS |
| 137 | -- | 147 | Mohammad Ali Jamshidi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref. Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator |
| 149 | -- | 163 | Maryam Rajabzadeh Asaar, Mustafa Isam Ahmed Al-Baghdadi. Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs |
| 165 | -- | 190 | Kostyantyn Anatolievich Malyshenko, Majid Mohammad Shafiee, Vadim Anatolievich Malyshenko. Identification of Fake News Using Emotional Profiling as an Approach to Text Analysis |
| 191 | -- | 203 | Mehmet Emin Gönen, Muhammed Said Gündogan, Kamil Otal. Boomerang Attacks on Reduced-Round Midori64 |
| 205 | -- | 220 | Nilakshi Gogoi, Dhruba K. Bhattacharyya, Debojit Boro. Shrew DDoS Attack Detection Based on Statistical Analysis |