Abstract is missing.
- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard ModelSha Ma, Qiong Huang. 3-19 [doi]
- A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption SchemeJoon Soo Yoo, Jeong-hwan Hwang, Baek Kyung Song, Ji Won Yoon. 20-40 [doi]
- Accelerating Number Theoretic Transform in GPU Platform for qTESLA SchemeWai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi. 41-55 [doi]
- Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWEChao Liu, Zhongxiang Zheng, Keting Jia, Qidi You. 56-72 [doi]
- KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection MechanismHiroki Kuzuno, Toshihiro Yamauchi. 75-94 [doi]
- Peel the Onion: Recognition of Android Apps Behind the Tor NetworkEmanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni. 95-112 [doi]
- JSLess: A Tale of a Fileless Javascript Memory-Resident MalwareSherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi. 113-131 [doi]
- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving ComputationPascal Lafourcade 0001, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone. 135-151 [doi]
- Secure Best Arm Identification in Multi-armed BanditsRadu Ciucanu, Pascal Lafourcade 0001, Marius Lombard-Platet, Marta Soare. 152-171 [doi]
- CATCHA: When Cats Track Your Movements OnlinePrakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat. 172-193 [doi]
- Designing a Code Vulnerability Meta-scannerRaounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, Isabelle Borne. 194-210 [doi]
- Using IFTTT to Express and Enforce UCON ObligationsAntonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino. 213-231 [doi]
- Evaluation of Software PUF Based on GyroscopeKazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki. 232-247 [doi]
- White-Box Implementation of the KMAC Message Authentication CodeJiqiang Lu, Zhigang Zhao, Huaqun Guo. 248-270 [doi]
- Improving Signature Schemes with Tight Security ReductionsTiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin. 273-292 [doi]
- Improved Digital Signatures Based on Elliptic Curve Endomorphism RingsXiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu 0008, Reza Azarderakhsh. 293-309 [doi]
- Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage ScenariosLukasz Krzywiecki, Marta Slowik, Michal Szala. 310-324 [doi]
- Recovering Internal States of Grain-v1Deepak Kumar Dalai, Santu Pal. 325-337 [doi]
- GDPR-Compliant Reputation System Based on Self-certifying Domain SignaturesMiroslaw Kutylowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala. 341-361 [doi]
- Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.KAndrew Rae, Asma Patel. 362-380 [doi]
- Privacy Preserving Approach in Dynamic Social Network Data PublishingKamalkumar R. Macwan, Sankita J. Patel. 381-398 [doi]
- Using Freivalds' Algorithm to Accelerate Lattice-Based Signature VerificationsArnaud Sipasseuth, Thomas Plantard, Willy Susilo. 401-412 [doi]
- Group-Based Key Exchange Protocol Based on Complete Decomposition Search ProblemChang Seng Sin, Huey Voon Chen. 413-422 [doi]
- Development Activities, Tools and Techniques of Secure Microservices CompositionsPeter T. Nkomo, Marijke Coetzee. 423-433 [doi]
- Generating Phishing Emails Using Graph DatabaseNasim Maleki, Ali A. Ghorbani. 434-449 [doi]
- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion DetectionWenjuan Li 0001, Weizhi Meng, Lam-for Kwok. 453-463 [doi]
- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking AlgorithmChris Pelchen, David Jaeger, Feng Cheng 0002, Christoph Meinel. 464-475 [doi]
- A Novel and Comprehensive Evaluation Methodology for SIEMMahdieh Safarzadeh, Hossein Gharaee, Amir Hossein Panahi. 476-488 [doi]