Abstract is missing.
- A Framework for Evaluation of Software Obfuscation Tools for Embedded DevicesAnjali J. Suresh, Sriram Sankaran. 1-13 [doi]
- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing SchemeLin Li, Chungen Xu, Zhongyi Liu, Lin Mei. 14-28 [doi]
- Digital Forensics for Drones: A Study of Tools and TechniquesSowmya Viswanathan, Zubair Baig. 29-41 [doi]
- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated OutputMatthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong. 42-60 [doi]
- 2qDigby Mooney, Lynn Margaret Batten, Leo Yu Zhang. 61-77 [doi]
- Malware Analysis Method Based Random Access Memory in AndroidWenping Ji, Jian Wang, Xudong He, Jiqiang Liu. 78-94 [doi]
- Vulnerability Database as a Service for IoTMark Nerwich, Praveen Gauravaram, Hye-Young Paik, Surya Nepal. 95-107 [doi]
- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX CipherSarah Alzakari, Poorvi Vora. 108-121 [doi]