714 | -- | 721 | Khalid T. Mursi, Yu Zhuang. Experimental Study of Component-Differentially-Challenged XOR PUFs as Security Primitives for Internet-of-Things |
722 | -- | 728 | Willian A. Dimitrov, Galina S. Panayotova. The Impacts of DNS Protocol Security Weaknesses |
729 | -- | 734 | Tengfei Hu, Zhenni Pan, Megumi Saitou, Jiang Liu 0005, Shigeru Shimamoto. A Triple-Band Antenna Loaded with Reflector Surface for WLAN and 5G Applications |
735 | -- | 740 | Mohammed M. Alani, Muath Alrammal, Munir Naveed. Implementing IoT Lottery on Data Encryption Standard |
741 | -- | 746 | Michael O'Sullivan, Leonardo Aniello, Vladimiro Sassone. A Methodology to Select Topology Generators for Ad Hoc Mesh Network Simulations |
747 | -- | 754 | Minh Nguyen Hieu 0001, Alexander Andreevich Moldovyan, Nikolay Andreevich Moldovyan, Canh Hoang Ngoc. A New Method for Designing Post-Quantum Signature Schemes |
755 | -- | 767 | Matimu Caswell Nkuna, Ebenezer Esenogho, Reolyn Heymann. Integrating Smartphone Network Architecture and Data Security Techniques to Mitigate Sharp Practices in Non-Profit Organizations |
768 | -- | 775 | Pushpender Sarao. Transmission Power Based Intelligent Model in VANET |