1 | -- | 15 | Hwankuk Kim. 5G core network security issues and attack classification from network protocol perspective |
16 | -- | 34 | Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni. Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble |
35 | -- | 48 | Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu 0005. Secure Computation Outsourcing for Inversion in Finite Field |
49 | -- | 66 | Andrey Pavlenko, Nursultan Askarbekuly, Swati Megha, Manuel Mazzara. Micro-frontends: application of microservices to web front-ends |
67 | -- | 81 | Sherifdeen Lawa, Ram Krishnan. Policy Review in Attribute Based Access Control - A Policy Machine Case Study |
82 | -- | 90 | Nguyen Canh Thang, Minho Park. Detecting Malicious Middleboxes In Service Function Chaining |
91 | -- | 102 | Francesco Colace, Massimo De Santo, Marco Lombardi, Rosalba Mosca, Domenico Santaniello. A Multilayer Approach for Recommending Contextual Learning Paths |
103 | -- | 121 | Yan Zhao, Ning Hu, Chi Zhang, Xinda Cheng. DCG: A Client-side Protection Method for DNS Cache |