Abstract is missing.
- Communicating Through Subliminal-Free SignaturesGeorge Teseleanu. 3-15 [doi]
- Size, Speed, and Security: An Ed25519 Case StudyCesar Pereida García, Sampo Sovio. 16-30 [doi]
- Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for DronesEugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas. 31-48 [doi]
- X-Pro: Distributed XDP Proxies Against Botnets of ThingsSyafiq Al Atiiq, Christian Gehrmann. 51-71 [doi]
- Industrialising Blackmail: Privacy Invasion Based IoT RansomwareCalvin Brierley, Budi Arief, David J. Barnes, Julio Hernandez-Castro. 72-92 [doi]
- SQL Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action StructureManuel Del Verme, Åvald Åslaugson Sommervoll, László Erdödi, Simone Totaro, Fabio Massimo Zennaro. 95-113 [doi]
- Secure Collaborative Learning for Predictive Maintenance in Optical NetworksKhouloud Abdelli, Joo Yeon Cho, Stephan Pachnicke. 114-130 [doi]
- Gollector: Measuring Domain Name Dark Matter from Different Vantage PointsKaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen. 133-152 [doi]
- Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses StrategiesHsin-Yi Chen, Siddharth Prakash Rao. 153-171 [doi]
- Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel ProtocolArto Niemi, Vasile Adrian Bogdan Pop, Jan-Erik Ekberg. 175-191 [doi]
- Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot CodeBjarke Hilmer Møller, Jacob Gosch Søndergaard, Kristoffer Skagbæk Jensen, Magnus Winkel Pedersen, Tobias Worm Bøgedal, Anton Christensen, Danny Bøgsted Poulsen, Kim Guldstrand Larsen, René Rydhof Hansen, Thomas Rosted Jensen, Heino Juvoll Madsen, Henrik Uhrenfeldt. 192-211 [doi]