- Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stanica. Quantum secure protocols for multiparty computations. Inf. Sec. Techn. Report, 90:104033, 2025.
- Li Yu, Je Sen Teh. Boomerang cryptanalysis of SAND. Inf. Sec. Techn. Report, 92:104086, 2025.
- Xiaohan Wan, Hao Lin, Mingqiang Wang, Wenting Shen. Hierarchical Threshold Multi-Key Fully Homomorphic Encryption. Inf. Sec. Techn. Report, 89:103919, 2025.
- Han Yu, Jianhong Zhou, Maode Ma. A high-security batch message authentication protocol assisted by edge servers in industrial Internet of Things. Inf. Sec. Techn. Report, 92:104075, 2025.
- Thanh Nhan Vo, Tzu-Chuen Lu. Interpolation data hiding schemes based on center folding strategy and well-turned embedded positions. Inf. Sec. Techn. Report, 91:104055, 2025.
- Xiaohong Zhang, Shijun Xiang, Hongbin Huang. Hiding speech in music files. Inf. Sec. Techn. Report, 89:103951, 2025.
- Lianpeng Li, Saifei Liu. MSD-CDRL: A generic fusion detection framework for logic covert attack towards cyber-physical system security. Inf. Sec. Techn. Report, 89:103947, 2025.
- Sandip Y. Bobade, Ravindra S. Apare, Ravindra H. Borhade, Parikshit N. Mahalle. Intelligent detection framework for IoT-botnet detection: DBN-RNN with improved feature set. Inf. Sec. Techn. Report, 89:103961, 2025.
- Guanlin Pan, Haowen Tan, Wenying Zheng, Pandi Vijayakumar, Q. M. Jonathan Wu, Audithan Sivaraman. Three-factor authentication and key agreement protocol with collusion resistance in VANETs. Inf. Sec. Techn. Report, 90:104029, 2025.
- Edward Chuah, Harsha Kalutarage, Kasim Tasdemir, Atnafu Abrham, Carsten Maple. A systematic literature review of log-correlation tools for cyberattack detection and prediction in large networks. Inf. Sec. Techn. Report, 92:104096, 2025.