Abstract is missing.
- A Scheme of Key Distribution in Smart GridYouwu Zhou, Mingjun Liu, Aimin Ye. 1-6 [doi]
- Code Structures for Quantum Encryption and DecryptionEric Sakk, Shuangbao Paul Wang. 7-11 [doi]
- Unified Attribute-Based Encryption Scheme for Industrial Internet of ThingsWei Li, Jing Si, Jianhua Xing, Yongjing Zhang, Deli Liu, Zhiyuan Sui. 12-16 [doi]
- Quantum Algorithms: Overviews, Foundations, and SpeedupsShuangbao Paul Wang, Eric Sakk. 17-21 [doi]
- Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace PasswordsDaniel Köhler, Eric Klieme, Matthias Kreuseler, Feng Cheng 0002, Christoph Meinel. 22-31 [doi]
- Automatic Test Case Generation for Vulnerability Analysis of Galois Field Arithmetic CircuitsKrishn Kumar Gupt, Meghana Kshirsagar 0002, Joseph P. Sullivan, Conor Ryan. 32-37 [doi]
- Investigating the Compliance of the GDPR: Processing Personal Data On A BlockchainMichelle Poelman, Sarfraz Iqbal. 38-44 [doi]
- Analysis and Improvements to the Special Number Field Sieve for Discrete Logarithm ProblemsLiwei Liu, MaoZhi Xu, Guoqing Zhou. 45-49 [doi]
- Trust Evaluation Algorithm based on Association Rule ExtractionYanchun Cui, Kai Zhong, Ansheng Yin. 50-54 [doi]
- DOSing Distributed Ledger Technology: IOTAMark A. Brady, Ikram Ullah, Paul J. M. Havinga. 55-61 [doi]
- velink - A Blockchain-based Shared Mobility Platform for Private and Commercial Vehicles utilizing ERC-721 TokensDominic Pirker, Thomas Fischer, Harald Witschnig, Christian Steger. 62-67 [doi]
- Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data ManagementCristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Josep Domingo-Ferrer. 68-73 [doi]
- A Blockchain-based Privacy-Preserving Recommendation MechanismLiangjie Lin, Yuchen Tian, Yang Liu. 74-78 [doi]
- A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy InternetKunchang Li, Xu Han, Yifan Yang, Shuhao Wang, Runhua Shi, Jianbin Li. 79-83 [doi]
- ECDSA-Compatible Privacy Preserving Signature With Designated VerifierSam Ng, Tomás Tauber, Leslie Cheung. 84-89 [doi]
- PRADroid: Privacy Risk Assessment for Android ApplicationsYang Yang, Xuehui Du, Zhi Yang. 90-95 [doi]
- A Study on Privacy Issues in Internet of Things (IoT)Naqliyah Zainuddin, Maslina Daud, Sabariah Ahmad, Mayasarah Maslizan, Syafiqa Anneisa Leng Abdullah. 96-100 [doi]
- Dimensionality-reduced Secure Outlier Detection on Union of SubspacesKunzan Liu, Yuchen Jiao, Ye Jin, Xu Xiang, Yuantao Gu. 101-106 [doi]
- SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP TechniquesJaouhar Fattahi, Mohamed Mejri. 107-112 [doi]
- A LSTM-Based Channel Fingerprinting Method for Intrusion DetectionTing Ma 0003, Feng Hu, Maode Ma. 113-116 [doi]
- DECH: A Novel Attack Pattern of Cloud Environment and Its CountermeasuresHaoyu Gao, Leixiao Li, Hao Lin, Jianxiong Wan, Dan Deng, Jie Li. 117-122 [doi]
- A Partial-Lifting-Based Compiling Concolic Execution ApproachHaotian Zhang, Weiyu Dong, Jian Lin. 123-128 [doi]
- Detecting Android Malware Based on Dynamic Feature Sequence and Attention MechanismHanlin Long, Zhicheng Tian, Yang Liu. 129-133 [doi]
- The Influence of Mobile Operating Systems on User Security BehaviorMartin Butler, Rika Butler. 134-138 [doi]
- DGA Domain Detection using Deep LearningHaleh Shahzad, Abdul Rahman Sattar, Janahan Skandaraniyam. 139-143 [doi]
- Research on Malware Variant Detection Method Based on Deep Neural NetworkJianhua Xing, Jing Si, Yongjing Zhang, Wei Li, Yuning Zheng. 144-147 [doi]
- Mobile Firewall applications: An analysis of usability and effectivenessWouter Louman, Mitchell Vernee, Danique de Bruijn, Babette van't Riet, Hani Alers. 148-152 [doi]
- Trend Analysis and Countermeasure Research of DDoS Attack Under 5G NetworkHaiou Huang, Jianfeng Chu, Xiaochun Cheng. 153-160 [doi]
- Multi-user broadcast authenticaiton in Power LTE Private Network with Compressed Bloom FilterGaofeng Zhao, Rui Liu, Yang Li, Jin Huang, Mingxuan Zhang, Weiwei Miao. 161-165 [doi]
- Power IoT security protection architecture based on zero trust frameworkXiaojian Zhang, Liandong Chen, Jie Fan, Xiangqun Wang, Qi Wang. 166-170 [doi]
- Outage Performance of Satellite-UAV Network Framework based on NOMAChangqing Wang, Xiangyu Yang, Quancheng Du, Jiaxiang Wang. 171-175 [doi]
- SARG04 and AK15 Protocols Based on the Run-Time Execution and QBERAbdulbast A. Abushgra. 176-180 [doi]
- Using Boltzmann Entropy to Measure Scrambling Degree of Grayscale ImagesXinghua Cheng, Zhilin Li. 181-185 [doi]
- ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance GraphYan Zheng, Weiyu Dong, Jiangtao Zhao. 186-192 [doi]
- Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic PurposesJaouhar Fattahi, Mohamed Mejri. 193-199 [doi]
- Forensic Analysis of Binary Structures of Video FilesMd Abir Hasan, Orion Lawlor, Nusrat Jahan. 200-204 [doi]
- License Plate Detection Using Bayesian Method Based on Edge FeaturesXinyun Yan, Chishe Wang, Dahui Hao, Min Chen. 205-211 [doi]