Abstract is missing.
- Forging Tropical SignaturesLorenz Panny. 3-7 [doi]
- Quantum Circuit Design for the Lee-Brickell Based Information Set DecodingSimone Perriello, Alessandro Barenghi, Gerardo Pelosi. 8-28 [doi]
- Projective Space Stern Decoding and Application to SDitHKévin Carrier, Valérian Hatey, Jean-Pierre Tillich. 29-52 [doi]
- One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing DetectionAlessandro Brighente, Mauro Conti, Sitora Salaeva, Federico Turrin. 55-74 [doi]
- Model Extraction Attack Without Natural ImagesKota Yoshida, Takeshi Fujino. 75-83 [doi]
- Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention MechanismsAmirhossein Ebrahimi Moghaddam, Buvana Ganesh, Paolo Palmieri 0001. 84-100 [doi]
- Differential Privacy with Selected Privacy Budget ε in a Cyber Physical System Using Machine LearningRuilin Wang, Chuadhry Mujeeb Ahmed. 101-116 [doi]
- Construction of 4 ˟ 4 Lightweight Low-Latency Involutory MDS MatricesZheng Zhao, Qun Liu 0006, Yanhong Fan 0001, Meiqin Wang. 119-140 [doi]
- Guidelines for Cyber Risk Management in Autonomous ShippingMeixuan Li, Awais Yousaf, Mark Goh, Jianying Zhou 0001, Sudipta Chattopadhyay 0001. 143-161 [doi]
- Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETsApurva K. Vangujar, Alia Umrani, Paolo Palmieri 0001. 162-179 [doi]
- One Time Chat - A Toy End-to-End Encrypted Web Messaging ServiceKamil Kaczynski, Michal Glet. 183-187 [doi]
- Game Theoretic Modeling of Insider Threats in an OrganizationK. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto. 188-192 [doi]
- Smart Appliance Abnormal Electrical Power Consumption DetectionRajesh Nayak, C. D. Jaidhar. 193-197 [doi]
- Towards Secure 5G Infrastructures for Production SystemsMartin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt. 198-203 [doi]
- Cybersecurity Awareness Education: Just as Useful for Technical UsersDaniel Köhler, Michael Büßemeyer, Christoph Meinel. 204-208 [doi]
- Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key BitsNitin Kumar Sharma 0001, Sabyasachi Dey 0001. 209-213 [doi]
- A Versatile and Unified HQC Hardware AcceleratorFrancesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella. 214-219 [doi]
- Applying Self-recognition Biometrics to Live Deepfake Detection in Video ConferencesHendrik Graupner, François-Nima Thobae, Christoph Meinel. 220-224 [doi]
- GAN and DM Generated Synthetic Image Detection in the Age of MisinformationTanusree Ghosh, Ruchira Naskar. 225-229 [doi]
- Extremely Simple Fail-Stop ECDSA SignaturesMario Yaksetig. 230-234 [doi]
- Physically Unclonable Fingerprints for AuthenticationNavajit Singh Baban, Jiarui Zhou, Sarani Bhattacharya, Urbi Chatterjee, Sukanta Bhattacharjee, Sanjairaj Vijayavenkataraman, Yong-Ak Song, Debdeep Mukhopadhyay, Krishnendu Chakrabarty, Ramesh Karri. 235-239 [doi]