Journal: J. Internet Serv. Inf. Secur.

Volume 10, Issue 2

1 -- 15Hwankuk Kim. 5G core network security issues and attack classification from network protocol perspective
16 -- 34Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni. Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble
35 -- 48Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu 0005. Secure Computation Outsourcing for Inversion in Finite Field
49 -- 66Andrey Pavlenko, Nursultan Askarbekuly, Swati Megha, Manuel Mazzara. Micro-frontends: application of microservices to web front-ends
67 -- 81Sherifdeen Lawa, Ram Krishnan. Policy Review in Attribute Based Access Control - A Policy Machine Case Study
82 -- 90Nguyen Canh Thang, Minho Park. Detecting Malicious Middleboxes In Service Function Chaining
91 -- 102Francesco Colace, Massimo De Santo, Marco Lombardi, Rosalba Mosca, Domenico Santaniello. A Multilayer Approach for Recommending Contextual Learning Paths
103 -- 121Yan Zhao, Ning Hu, Chi Zhang, Xinda Cheng. DCG: A Client-side Protection Method for DNS Cache