Abstract is missing.
- Teleporting Qubits Between Participants by Third-Party CenterAbdulbast A. Abushgra. 1-5 [doi]
- Anonymity-driven Measures for PrivacySevgi Arca, Rattikorn Hewett. 6-10 [doi]
- RippleSign: Isogeny-Based Threshold Ring Signatures with Combinatorial MethodsLi Li, MaoZhi Xu. 11-15 [doi]
- The Processing goes far beyond "the app" - Privacy issues of decentralized Digital Contact Tracing using the example of the German Corona-Warn-AppRainer Rehak, Christian Ricardo Kühne. 16-20 [doi]
- Evaluation Study on Privacy Policies of Express Companies Based on Cloud ModelQian Zhang, Weihong Xie, Xinxian Pan. 21-26 [doi]
- Differential Privacy under Incalculable SensitivityTomoaki Mimoto, Masayuki Hashimoto, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara, Ryosuke Kojima, Aki Hasegawa, Yasushi Okuno. 27-31 [doi]
- Computational Refinements for Post-Quantum Elliptic Curve SecurityEric Sakk. 32-35 [doi]
- Analyzing Initial Design Theory Components for Developing Information Security LaboratoriesSarfraz Iqbal. 36-40 [doi]
- A Lightweight Advertisement Ecosystem Simulation Platform for Security AnalysisChenjia Yu, Mehdi Gheisari, Yang Liu. 41-45 [doi]
- A Proactively Defensive Low-Level Decision Center Model of Endogenous SecurityLi Feilin, Li Tao, Hu Aiqu. 46-50 [doi]
- Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block CipherNilupulee Anuradha Gunathilake, Ahmed Al-Dubai 0001, William J. Buchanan, Owen Lo. 51-55 [doi]
- Context-based Adblocker using Siamese Neural NetworkShawn Collins, Emily Wu, Rui Ning. 56-60 [doi]
- IoTProtect: A Machine-Learning Based IoT Intrusion Detection SystemMohammed M. Alani. 61-65 [doi]
- The Future Roadmap for Cyber-attack DetectionRaha Soleymanzadeh, Rasha Kashef 0001. 66-70 [doi]
- Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding ActivitiesJia Wang, Takayuki Sasaki, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto. 71-79 [doi]
- Cyber-Security Enhanced Network Meta-Model and its ApplicationXinli Xiong, Liang Guo, Yunfeng Zhang, Jingye Zhang. 80-85 [doi]
- Cyber Threat Analysis and Trustworthy Artificial IntelligenceShuangbao Paul Wang, Md Tanvir Arafin, Onyema Osuagwu, Ketchiozo Wandji. 86-90 [doi]
- CoAP-DoS: An IoT Network Intrusion Data SetJared Mathews, Prosenjit Chatterjee, Shankar Banik. 91-95 [doi]
- Analysis of the Propagation of Miner BotnetYuxi Cheng, Ziang Jin, Wei Ding. 96-101 [doi]
- Spectrum-based Fingerprint Extraction and Identification Method of 100M Ethernet CardJiaqi Liu, Aiqun Hu, Sheng Li. 102-107 [doi]
- A Class of Software-Layer DoS Attacks in Node.js Web AppsTuong Phi Lau. 108-113 [doi]
- Vertical Scanning Behavior Analysis of High-Frequency SuperpointsWenxian Guo, Haiqing Yu, Wei Ding 0001. 114-118 [doi]
- The AILA Methodology for Automated and Intelligent Likelihood AssignmentGiampaolo Bella, Cristian Daniele, Mario Raciti. 119-123 [doi]
- From Machine Learning Based Intrusion Detection to Cost Sensitive Intrusion ResponseTazar Hussain, Alfie Beard, Liming Chen, Chris D. Nugent, Jun Liu, Adrian Moore 0001. 124-130 [doi]
- Blockchain-based identity dicovery between heterogenous identity management systemsMarcin Dabrowski, Piotr Pacyna. 131-137 [doi]
- Convex Hull Convolutive Non-negative Matrix Factorization Based Speech Enhancement For Multimedia CommunicationDongxia Wang, Jie Cui, Jinghua Wang, Huan Tan, Ming Xu. 138-142 [doi]
- An approach to construct feedforward clock-controlled sequence with high linear complexityYangpan Zhang. 143-147 [doi]
- A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud ComputingJiangyong Shi, Ping Kuang, Yongjun Wang, Yuexiang Yang. 148-153 [doi]
- Blockchain-based Smart Parking System using Ring Learning With Errors based SignatureJihan Lailatul Atiqoh, Ari Moesriami Barmawi, Farah Afianti. 154-158 [doi]