Abstract is missing.
- FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based MitigationChandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal. 3-24 [doi]
- Accelerating TEE-Based DNN Inference Using Mean Shift Network PruningChengyao Xu, Shangqi Lai. 25-41 [doi]
- Towards Secure and Trustworthy Crowdsourcing with Versatile Data AnalyticsRui Lian, Anxin Zhou, Yifeng Zheng, Cong Wang. 42-53 [doi]
- Blockchain for IoT: A Critical Analysis Concerning Performance and ScalabilityZiaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev. 57-74 [doi]
- Toward Achieving Unanimity for Implicit Closings in a Trustless SystemMitsuyoshi Imamura, Kazumasa Omote. 75-93 [doi]
- DBS: Blockchain-Based Privacy-Preserving RBAC in IoTXianxian Li, Junhao Yang, Shiqi Gao, Zhenkui Shi, Jie Li, Xuemei Fu. 94-110 [doi]
- Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on BlockchainXianxian Li, Jiahui Peng, Zhenkui Shi, Chunpei Li. 111-125 [doi]
- A Lightweight Authentication Protocol for 5G Cellular Network Connected DronesSiyu Chen, Shujie Cui, Joseph Liu. 129-143 [doi]
- Anti-eavesdropping Proportional Fairness Access Control for 5G NetworksShankar K. Ghosh, Avirup Das, Sasthi C. Ghosh 0001, Nabanita Das. 144-158 [doi]
- Joint Relay Selection and Frequency Allocation for D2D CommunicationsRathindra Nath Dutta, Sasthi C. Ghosh 0001. 159-173 [doi]
- Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT SecurityZiaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi. 177-193 [doi]
- A Usability Study of Cryptographic API DesignJunwei Luo, Xun Yi, Fengling Han, Xuechao Yang. 194-213 [doi]
- An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight CipherMuhammad Rana, Quazi Mamun, Md. Rafiqul Islam 0001. 214-227 [doi]
- The Phantom Gradient Attack: A Study of Replacement Functions for the XOR FunctionÅvald Åslaugson Sommervoll. 228-238 [doi]
- Topology Validator - Defense Against Topology Poisoning Attack in SDNAbhay Kumar, Sandeep Shukla. 241-260 [doi]
- Towards an Attention-Based Accurate Intrusion Detection ApproachArunavo Dey, Md. Shohrab Hossain, Md. Nazmul Hoq, Suryadipta Majumdar. 261-279 [doi]
- Avoiding VPN Bottlenecks: Exploring Network-Level Client Identity Validation OptionsYu Liu, Craig A. Shue. 280-300 [doi]
- Puncturable Search: Enabling Authorized Search in Cross-data FederationLin Mei, Chungen Xu, Qianmu Li. 303-322 [doi]
- Privacy-Preserving Ranked Searchable Encryption Based on Differential PrivacyYu Zhao, Chungen Xu, Lin Mei, Pan Zhang. 323-339 [doi]
- Memory-Efficient Encrypted Search Using Trusted Execution EnvironmentViet Vo. 340-351 [doi]