Abstract is missing.
- Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion RecognitionSamaneh Mohammadi, Sima Sinaei, Ali Balador, Francesco Flammini. 1-16 [doi]
- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space RepresentationsTran Duc Luong, Vuong Minh Tien, Phan The Duy, Van-Hau Pham. 17-35 [doi]
- Mitigating Sybil Attacks in Federated LearningAhmed E. Samy, Sarunas Girdzijauskas. 36-51 [doi]
- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft BiometricsJiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li 0006, Zheng Yan 0002. 52-73 [doi]
- Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for PrivacySebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi. 74-90 [doi]
- Cross-Border Data Security from the Perspective of Risk AssessmentNa Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang 0001. 91-104 [doi]
- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier SignaturesYohei Watanabe 0001, Naoto Yanai, Junji Shikata. 105-122 [doi]
- CVAR-FL IoV Intrusion Detection FrameworkJia Zhao, Xinyu Rao, Jiqiang Liu, Yue Guo, Bokai Yang. 123-137 [doi]
- Transparent Security Method for Automating IoT Security AssessmentsRauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning. 138-153 [doi]
- DIDO: Data Provenance from Restricted TLS 1.3 WebsitesKwan Yin Chan, Handong Cui, Tsz Hon Yuen. 154-169 [doi]
- QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information SharingMahdieh Safarzadehvahed, Farzaneh Abazari, Fateme Shabani. 170-193 [doi]
- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6GRabeya Basri, Gour C. Karmakar, Joarder Kamruzzaman, S. H. Shah Newaz, Linh V. Nguyen, Muhammad Usman 0015. 194-208 [doi]
- RTR-Shield: Early Detection of Ransomware Using Registry and Trap FilesP. Mohan Anand, P. V. Sai Charan, Hrushikesh Chunduri, Sandeep K. Shukla. 209-229 [doi]
- MalXCap: A Method for Malware Capability ExtractionBikash Saha, Nanda Rani, Sandeep Kumar Shukla. 230-249 [doi]
- Multimodal Software Defect Severity Prediction Based on Sentiment ProbabilityYing Li, Yuhao Lin, Yongchao Zhong, Qiuling Yue, Jinglu Hu, Wenjie Wang, Huiyang Shi, Yuqing Zhang 0001. 250-265 [doi]
- Recovering Multi-prime RSA Keys with Erasures and ErrorsGuanghui Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao 0001. 266-283 [doi]
- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an ExampleThomas Prantl, Simon Engel, Lukas Horn, Dennis Kaiser, Lukas Iffländer, André Bauer 0001, Christian Krupitzer, Samuel Kounev. 284-298 [doi]
- Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified IdentitiesSohto Chiku, Keisuke Hara, Junji Shikata. 299-314 [doi]
- A New Gadget Decomposition Algorithm with Less Noise Growth in HE SchemesChao Liu, Bozhong Liu. 315-331 [doi]
- Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private OperationsTomoya Morooka, Yoshifumi Manabe, Kazumasa Shinagawa. 332-346 [doi]
- Cryptanalysis of Human Identification Protocol with Human-Computable PasswordsMaciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj. 347-364 [doi]
- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS)Hannes Salin, Lukasz Krzywiecki. 365-379 [doi]
- A Revocable Outsourced Data Accessing Control Scheme with Black-Box TraceabilityYuchen Yin, Qingqing Gan, Cong Zuo, Ning Liu, Changji Wang, Yuning Jiang. 380-398 [doi]
- LocKey: Location-Based Key Extraction from the WiFi Environment in the User's VicinityPhilipp Jakubeit, Andreas Peter, Maarten van Steen. 399-418 [doi]
- BAHS: A Blockchain-Aided Hash-Based Signature SchemeYalan Wang, Liqun Chen 0002, Long Meng, Yangguang Tian. 419-439 [doi]
- Lever: Making Intensive Validation Practical on BlockchainMingming Wang, Qianhong Wu. 440-461 [doi]
- Tikuna: An Ethereum Blockchain Network Security Monitoring SystemAndrés Gómez Ramirez, Loui Al Sardy, Francis Gomez Ramirez. 462-476 [doi]
- Isogeny-Based Multi-signature SchemeMathieu de Goyon, Atsuko Miyaji. 477-491 [doi]
- Security Analysis of WAGE Against Division Property Based Cube AttackBijoy Das, Abhijit Das 0004, Dipanwita Roy Chowdhury. 492-506 [doi]
- When MPC in the Head Meets VCLi Liu, Puwen Wei. 507-526 [doi]
- Quantum Key Distribution as a Service and Its Injection into TLSSergejs Kozlovics, Krisjanis Petrucena, Davis Larins, Juris Viksna. 527-545 [doi]
- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance GraphNgo Duc Hoang Son, Huynh Thai Thi, Phan The Duy, Van-Hau Pham. 546-561 [doi]
- XSS Attack Detection by Attention Mechanism Based on Script Tags in URLsYuki Nakagawa, Mamoru Mimura. 562-578 [doi]
- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep LearningZhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou 0018, Liming Fang 0001, Zhe Liu 0001, Chunpeng Ge, Chunhua Su. 579-594 [doi]
- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using BlockchainAjay Chandra Korlapati, Sanjeet Kumar Nayak, Partha Sarathi Chakraborty 0001, Somanath Tripathy. 595-613 [doi]