Abstract is missing.
- A Scheme of Key Distribution in Smart GridYouwu Zhou, Mingjun Liu, Aimin Ye. 1-6  [doi]
- Code Structures for Quantum Encryption and DecryptionEric Sakk, Shuangbao Paul Wang. 7-11  [doi]
- Unified Attribute-Based Encryption Scheme for Industrial Internet of ThingsWei Li, Jing Si, Jianhua Xing, Yongjing Zhang, Deli Liu, Zhiyuan Sui. 12-16  [doi]
- Quantum Algorithms: Overviews, Foundations, and SpeedupsShuangbao Paul Wang, Eric Sakk. 17-21  [doi]
- Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace PasswordsDaniel Köhler, Eric Klieme, Matthias Kreuseler, Feng Cheng 0002, Christoph Meinel. 22-31  [doi]
- Automatic Test Case Generation for Vulnerability Analysis of Galois Field Arithmetic CircuitsKrishn Kumar Gupt, Meghana Kshirsagar 0002, Joseph P. Sullivan, Conor Ryan. 32-37  [doi]
- Investigating the Compliance of the GDPR: Processing Personal Data On A BlockchainMichelle Poelman, Sarfraz Iqbal. 38-44  [doi]
- Analysis and Improvements to the Special Number Field Sieve for Discrete Logarithm ProblemsLiwei Liu, MaoZhi Xu, Guoqing Zhou. 45-49  [doi]
- Trust Evaluation Algorithm based on Association Rule ExtractionYanchun Cui, Kai Zhong, Ansheng Yin. 50-54  [doi]
- DOSing Distributed Ledger Technology: IOTAMark A. Brady, Ikram Ullah, Paul J. M. Havinga. 55-61  [doi]
- velink - A Blockchain-based Shared Mobility Platform for Private and Commercial Vehicles utilizing ERC-721 TokensDominic Pirker, Thomas Fischer, Harald Witschnig, Christian Steger. 62-67  [doi]
- Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data ManagementCristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Josep Domingo-Ferrer. 68-73  [doi]
- A Blockchain-based Privacy-Preserving Recommendation MechanismLiangjie Lin, Yuchen Tian, Yang Liu. 74-78  [doi]
- A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy InternetKunchang Li, Xu Han, Yifan Yang, Shuhao Wang, Runhua Shi, Jianbin Li. 79-83  [doi]
- ECDSA-Compatible Privacy Preserving Signature With Designated VerifierSam Ng, Tomás Tauber, Leslie Cheung. 84-89  [doi]
- PRADroid: Privacy Risk Assessment for Android ApplicationsYang Yang, Xuehui Du, Zhi Yang. 90-95  [doi]
- A Study on Privacy Issues in Internet of Things (IoT)Naqliyah Zainuddin, Maslina Daud, Sabariah Ahmad, Mayasarah Maslizan, Syafiqa Anneisa Leng Abdullah. 96-100  [doi]
- Dimensionality-reduced Secure Outlier Detection on Union of SubspacesKunzan Liu, Yuchen Jiao, Ye Jin, Xu Xiang, Yuantao Gu. 101-106  [doi]
- SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP TechniquesJaouhar Fattahi, Mohamed Mejri. 107-112  [doi]
- A LSTM-Based Channel Fingerprinting Method for Intrusion DetectionTing Ma 0003, Feng Hu, Maode Ma. 113-116  [doi]
- DECH: A Novel Attack Pattern of Cloud Environment and Its CountermeasuresHaoyu Gao, Leixiao Li, Hao Lin, Jianxiong Wan, Dan Deng, Jie Li. 117-122  [doi]
- A Partial-Lifting-Based Compiling Concolic Execution ApproachHaotian Zhang, Weiyu Dong, Jian Lin. 123-128  [doi]
- Detecting Android Malware Based on Dynamic Feature Sequence and Attention MechanismHanlin Long, Zhicheng Tian, Yang Liu. 129-133  [doi]
- The Influence of Mobile Operating Systems on User Security BehaviorMartin Butler, Rika Butler. 134-138  [doi]
- DGA Domain Detection using Deep LearningHaleh Shahzad, Abdul Rahman Sattar, Janahan Skandaraniyam. 139-143  [doi]
- Research on Malware Variant Detection Method Based on Deep Neural NetworkJianhua Xing, Jing Si, Yongjing Zhang, Wei Li, Yuning Zheng. 144-147  [doi]
- Mobile Firewall applications: An analysis of usability and effectivenessWouter Louman, Mitchell Vernee, Danique de Bruijn, Babette van't Riet, Hani Alers. 148-152  [doi]
- Trend Analysis and Countermeasure Research of DDoS Attack Under 5G NetworkHaiou Huang, Jianfeng Chu, Xiaochun Cheng. 153-160  [doi]
- Multi-user broadcast authenticaiton in Power LTE Private Network with Compressed Bloom FilterGaofeng Zhao, Rui Liu, Yang Li, Jin Huang, Mingxuan Zhang, Weiwei Miao. 161-165  [doi]
- Power IoT security protection architecture based on zero trust frameworkXiaojian Zhang, Liandong Chen, Jie Fan, Xiangqun Wang, Qi Wang. 166-170  [doi]
- Outage Performance of Satellite-UAV Network Framework based on NOMAChangqing Wang, Xiangyu Yang, Quancheng Du, Jiaxiang Wang. 171-175  [doi]
- SARG04 and AK15 Protocols Based on the Run-Time Execution and QBERAbdulbast A. Abushgra. 176-180  [doi]
- Using Boltzmann Entropy to Measure Scrambling Degree of Grayscale ImagesXinghua Cheng, Zhilin Li. 181-185  [doi]
- ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance GraphYan Zheng, Weiyu Dong, Jiangtao Zhao. 186-192  [doi]
- Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic PurposesJaouhar Fattahi, Mohamed Mejri. 193-199  [doi]
- Forensic Analysis of Binary Structures of Video FilesMd Abir Hasan, Orion Lawlor, Nusrat Jahan. 200-204  [doi]
- License Plate Detection Using Bayesian Method Based on Edge FeaturesXinyun Yan, Chishe Wang, Dahui Hao, Min Chen. 205-211  [doi]