Abstract is missing.
- Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map SystemBodi Bodi, Wei-Yang Chiu, Weizhi Meng 0001. 3-20 [doi]
- Blockchain-Based Self-Sovereign Identity System with Attribute-Based IssuanceYi-Hsiu Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng. 21-38 [doi]
- Blockchain-Based Confidential Payment System with Controllable RegulationYu-Chen Liao, Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng. 39-56 [doi]
- Designing Enhanced Robust 6G Connection Strategy with BlockchainAugust Lykke Thomsen, Bastian Preisel, Victor Rodrigues Andersen, Wei-Yang Chiu, Weizhi Meng 0001. 57-74 [doi]
- Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing DataZheng Yao Ng, Iftekhar Salam. 75-92 [doi]
- UCC: Universal and Committee-based Cross-chain FrameworkYi Zhang, Zhonghui Ge, Yu Long 0001, Dawu Gu. 93-111 [doi]
- A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and ResponseJuan Christian, Luis Paulino, Alan Oliveira de Sá. 115-139 [doi]
- Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone AwryMd Rakibul Hasan Talukder, Md. Al-Amin, Indrajit Ray. 140-157 [doi]
- Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoTSubir Halder, Thomas Newe. 161-178 [doi]
- A New Scalable Mutual Authentication in Fog-Edge Drone Swarm EnvironmentKyusuk Han, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun. 179-196 [doi]
- Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things SystemsYinqin Huang, Cheng Dai, Wei-Che Chien. 197-212 [doi]
- LMGROUP: A Lightweight Multicast Group Key Management for IoT NetworksPegah Nikbakht Bideh. 213-230 [doi]
- Using API Calls for Sequence-Pattern Feature Mining-Based Malware DetectionGheorghe Balan, Dragos Teodor Gavrilut, Henri Luchian. 233-251 [doi]
- Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell DetectionYuki Mezawa, Mamoru Mimura. 252-267 [doi]
- Detect Compiler Inserted Run-time Security Checks in Binary SoftwareKoyel Pramanick, Prasad A. Kulkarni. 268-286 [doi]
- Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term PerformanceSilviu Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian. 287-305 [doi]
- PriApp-Install: Learning User Privacy Preferences on Mobile Apps' InstallationHa Xuan Son, Barbara Carminati, Elena Ferrari. 306-323 [doi]
- BADPASS: Bots Taking ADvantage of Proxy as a ServiceElisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Vincent Rigal. 327-344 [doi]
- A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 AttacksOrhan Ermis, Christophe Feltus, Qiang Tang 0001, Hoang Trang, Alexandre de Oliveira, Cu D. Nguyen, Alain Hirtzig. 345-363 [doi]
- Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement LearningNguyen Huu Quyen, Phan The Duy, Nguyen Chi Vy, Do Thi Thu Hien, Van-Hau Pham. 364-381 [doi]
- Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection SystemXuan-Ha Nguyen, Xuan-Duong Nguyen, Le Kim-Hung. 382-396 [doi]
- Detection of Adversarial Examples Based on the Neurons DistributionJiang-Yi Zeng, Chi-Yuan Chen, Hsin-Hung Cho. 397-405 [doi]
- Techniques for Continuous Touch-Based AuthenticationMartin Georgiev, Simon Eberz, Ivan Martinovic. 409-431 [doi]
- Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded SystemsTasopoulos George, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld. 432-451 [doi]
- Secure Human Identification Protocol with Human-Computable PasswordsSlawomir Matelski. 452-467 [doi]
- Practical Backdoor Attack Against Speaker Recognition SystemYuxiao Luo, Jianwei Tai, Xiaoqi Jia, Shengzhi Zhang. 468-484 [doi]
- Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An SurveyGuiwen Fu, Yanan Chen, Zhen Wu, Qianlin Ye. 485-501 [doi]
- Optimal Generic Attack Against Basic Boneh-Boyen SignaturesYen-Kang Fu, Jonathan Chang, David Jao. 505-519 [doi]
- Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBsNasratullah Ghafoori, Atsuko Miyaji. 520-536 [doi]
- Physical Zero-Knowledge Proof Protocol for TopswopsYuichi Komano, Takaaki Mizuki. 537-553 [doi]
- Attribute Based Tracing for Securing Group Signatures Against Centralized AuthoritiesMaharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai. 554-572 [doi]
- Sherlock Holmes Zero-Knowledge ProtocolsGeorge Teseleanu. 573-588 [doi]
- Continued Fractions Applied to a Family of RSA-like CryptosystemsPaul Cotan, George Teseleanu. 589-605 [doi]
- M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable EncryptionJiaming Yuan, Yingjiu Li, Jianting Ning, Robert H. Deng. 606-623 [doi]
- A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare ScenariosYang Zhao, Zhaozhong Liu, Jingmin An, Guobin Zhu, Saru Kumari. 624-639 [doi]