Abstract is missing.
- A Security Analysis of Password Managers on AndroidAbhyudaya Sharma, Sweta Mishra. 3-22 [doi]
- The Design and Application of a Unified Ontology for Cyber SecurityKhandakar Ashrafi Akbar, Fariha Ishrat Rahman, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham. 23-41 [doi]
- Big Data Forensics on Apache KafkaThomas Mager. 42-56 [doi]
- A Survey on Security Threats and Mitigation Strategies for NoSQL Databases - MongoDB as a Use CaseSurabhi Dwivedi, R. Balaji, Praveen Ampatt, Sithu D. Sudarsan. 57-76 [doi]
- Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness ConstraintsVenkata Sreekanth Balijabudda, Kamalesh Acharya, Rajat Subhra Chakraborty, Indrajit Chakrabarti. 77-87 [doi]
- Detection and Hardening Strategies to Secure an Enterprise NetworkPreetam Mukherjee 0001, Sabu M. Thampi, N. Rohith, Bishwajit Kumar Poddar, Ipshita Sen. 91-108 [doi]
- Attack Graph Based Security Metrics for Dynamic NetworksAyan Gain, Mridul Sankar Barik. 109-128 [doi]
- An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using Tunicate Swarm OptimizationSunil Kumar Kammula, Veena Anand, Deepak Singh. 129-138 [doi]
- STN-Net: A Robust GAN-Generated Face DetectorTanusree Ghosh, Ruchira Naskar. 141-158 [doi]
- MDLDroid: Multimodal Deep Learning Based Android Malware DetectionNarendra Singh, Somanath Tripathy. 159-177 [doi]
- A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural NetworksDavid Rodriguez, Ram Krishnan. 178-196 [doi]
- Secure KNN Computation on CloudTikaram Sanyashi, Nirmal Kumar Boran, Virendra Singh. 197-216 [doi]
- A Multi-stage Multi-modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented FeaturesArnab Kumar Das, Soumik Mukhopadhyay, Arijit Dalui, Ritaban Bhattacharya, Ruchira Naskar. 217-226 [doi]
- Security and Privacy in Machine LearningNishanth Chandran. 229-248 [doi]
- Attack on the Privacy-Preserving Carpooling Service TAROTMeghana Vargheese, Srinivas Vivek 0001. 249-258 [doi]
- Democracy in Your Hands!: Practical Multi-key Homomorphic E-VotingTanusree Parbat, Aniket Banerjee, Ayantika Chatterjee. 259-271 [doi]
- Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data SharingG. A. Thushara, S. Mary Saira Bhanu. 275-294 [doi]
- Verifiable Timed Accountable Subgroup Multi-signaturesDuygu Ozden, Oguz Yayla. 295-305 [doi]
- Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of ThingsSourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala. 306-316 [doi]
- Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign IdentitiesCristian Alves dos Santos, Leandro Loffi, Carla Merkle Westphall. 319-338 [doi]
- Analysis of Optimal Number of Shards Using ShardEval, A Simulator for Sharded BlockchainsVishisht Priyadarshi, Sourav Goel, Kalpesh Kapoor. 339-359 [doi]
- SoK: Digital Signatures and Taproot Transactions in BitcoinAnubha Jain, Emmanuel S. Pilli. 360-379 [doi]
- BCTPV-NIZK: Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain AssumptionsNimish Mishra, SK Hafizul Islam. 380-395 [doi]
- Proof-of-Variable-Authority: A Blockchain Consensus Mechanism for Securing IoT NetworksLenoah Chacko, Pavithra Rajan, Varun Anilkumar, Vinod Pathari. 396-410 [doi]
- An Efficient Two-Party ECDSA Scheme for CryptocurrenciesHabeeb Syed, Arinjita Paul, Meena Singh Dilip Singh, M. A. Rajan. 411-430 [doi]
- Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain TechnologyKamalakanta Sethi, Aniket Agrawal, Padmalochan Bera. 431-448 [doi]
- Crypto-Ransomware Detection: A Honey-File Based Approach Using Chi-Square TestAjith Arakkal, Shehzad Pazheri Sharafudheen, A. R. Vasudevan. 449-458 [doi]
- PSDP: Blockchain-Based Computationally Efficient Provably Secure Data PossessionJayaprakash Kar. 459-468 [doi]
- Private and Verifiable Inter-bank Transactions and Settlements on BlockchainHarika Narumanchi, Lakshmi Padmaja Maddali, Nitesh Emmadi. 469-479 [doi]