Abstract is missing.
- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoTChunhua Jin, Chenhao Li, Wenyu Qin, Xiaobing Chen, Guanhua Chen. 3-17 [doi]
- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of VehiclesYangpeng Wang, Ling Xiong, Xianhua Niu, Yunxiang Wang, Dexin Liang. 18-33 [doi]
- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart BuildingOtuekong Ekpo, Kate Takyi, Rose-mary Owusuaa Mensah Gyening. 34-47 [doi]
- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart GovernmentJingting Xue, Shuqin Luo, Lingjie Shi, Xiaojun Zhang, Chunxiang Xu. 48-68 [doi]
- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of ThingsXiaoguang Liu, Yingying Sun, Hao Dong. 69-86 [doi]
- Cross-site Scripting Threat Intelligence Detection Based on Deep LearningZhonglin Liu, Yong Fang, Yijia Xu. 89-104 [doi]
- Power Analysis Attack Based on Lightweight Convolutional Neural NetworkXiang Li, Ning Yang, Aidong Chen, Weifeng Liu, Xiaoxiao Liu, Na Huang. 105-118 [doi]
- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning AlgorithmsEmmanuel Kwesi Baah, Steven Yirenkyi, Dominic Asamoah, Stephen Opoku Oppong, Edward Opoku-Mensah, Benjamin Tei Partey, Anthony Kingsley Sackey, Oliver Kornyo, Evans Obu. 119-133 [doi]
- SVFLS: A Secure and Verifiable Federated Learning Training SchemeYi Liu, Guoxiong Hu, Yudi Zhang 0001, Mingwu Zhang. 134-148 [doi]
- A Pragmatic Label-Specific Backdoor AttackYu Wang, Haomiao Yang, Jiasheng Li, Mengyu Ge. 149-162 [doi]
- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack SourceSamuel Kelly Brew, Emmanuel Ahene. 163-179 [doi]
- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-Based Smart Grid EnvironmentEgide Nkurunziza, Lawrence Tandoh, Elfadul Issameldeen, Mwitende Gervais. 183-197 [doi]
- Blockchain-Based Patient-to-Patient Health Data SharingSandro Amofa, Jianbin Gao, Maame Gyamfua Asante-Mensah, Charles Roland Haruna, Xia Qi. 198-210 [doi]
- Efficient and Automatic Pseudonym Management Scheme for VANET with BlockchainXiangsong Zhang, Ming Yuan, Zhenhua Liu 0001. 211-225 [doi]
- Ethereum Contract Honeypot Risk AnalysisMotoya Ishimaki, Kazumasa Omote. 226-240 [doi]
- A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized BlockchainsAbigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou 0002. 241-257 [doi]
- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling SchemeYulian Li, Hua Shen. 261-274 [doi]
- New Trapdoor and Preimage Sampling on NTRU LatticeChengrong Liu, Chunming Tang 0003, Huiwen Jia. 275-287 [doi]
- Secure EHR Sharing Scheme Based on Limited Sanitizable SignatureYang Yang, Bixia Yi, Yonghua Zhan, Minming Huang. 288-303 [doi]
- A Rotating Multi-secret Color Visual Cryptography Scheme Based on Meaningful SharesYanyan Han, Yikun Zhou, Peng Li, Xinyang Liu. 304-323 [doi]
- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud StorageZhenhua Liu 0001, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang. 324-345 [doi]
- A Comparative Analysis of Security Features and Concerns in NoSQL DatabasesEvans Ankomah, Charles Roland Haruna, Francis Xavier Kofi Akotoye, Brighter Agyemang, Kwame Opuni-Boachie Obour Agyekum, Alexander Asante, Lawrence Ephrim, Alexander N. T. Kissiedu. 349-364 [doi]
- Improving Online Restore Performance of Backup Storage via Historical File Access PatternXingpeng Tang, Jingwei Li 0001. 365-376 [doi]
- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret SharingQikai Feng, Bai Liu. 377-391 [doi]
- Quantum Information Splitting Scheme of Arbitrary Three-Qubit State by Using a Four-Qubit Cluster State and a Bell StateDongfen Li, Jie Zhou, Xiaolong Yang, Yuqaio Tan, Yundan Zheng, Xiaofang Liu. 395-409 [doi]
- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection SystemLong Yin, Jian Xu, Heqiu Chai, Chen Wang. 413-428 [doi]