Abstract is missing.
- Dynamic Security Analysis of Zoom, Google Meet and Microsoft TeamsNicholas Hunter Gauthier, Mohammad Iftekhar Husain. 3-24 [doi]
- A Secure Encapsulation Schemes Based on Key Recovery SystemTae Hoon Kim, Won-Bin Kim, Daehee Seo, Im-Yeong Lee. 25-37 [doi]
- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter GeneratorYuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami. 38-48 [doi]
- STRISA: A New Regulation Architecture to Enforce Travel RuleWei-Tek Tsai, Dong Yang, Rong Wang, Kangmin Wang, Weijing Xiang, Enyan Deng. 49-67 [doi]
- Post-quantum Hash-Based Signatures for Secure BootPanos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff. 71-86 [doi]
- Exploring the Coverage of Existing Hardware Vulnerabilities in Community StandardsPaul A. Wortman, Fatemeh Tehranipoor, John A. Chandy. 87-97 [doi]
- MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity ManagementBonha Koo, Taegeun Moon, Hyoungshick Kim. 98-108 [doi]
- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a CountermeasureNikita Acharya, Vedika Saravanan, Samah Mohamed Saeed. 109-114 [doi]
- SpartanGold: A Blockchain for Education, Experimentation, and Rapid PrototypingThomas H. Austin. 117-133 [doi]
- BIOT: A Blockchain-Based IoT Platform for Distributed Energy Resource ManagementMostafa Yalpanian, Naser Mirzaei, Alireza Parvizimosaed, Farid Farmani, Mehdi Parvizimosaed, Behdad Bahrami. 134-147 [doi]
- A Privacy Preserving E-Voting System Based on BlockchainWenjun Fan, Shubham Kumar, Vrushali Jadhav, Sang-Yoon Chang, Younghee Park. 148-159 [doi]
- BioBlockchain: Useful Proof-of-Work with Multiple Sequence AlignmentYan Chen, Thomas H. Austin, Philip Heller. 160-166 [doi]
- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing AmbiguityChungsik Song, Wenjun Fan, Sang-Yoon Chang, Younghee Park. 169-187 [doi]
- A Systematic Approach to Building Autoencoders for Intrusion DetectionYoungrok Song, Sangwon Hyun, Yun-Gyung Cheong. 188-204 [doi]
- ConTheModel: Can We Modify Tweets to Confuse Classifier Models?Aishwarya Ram Vinay, Mohsen A. Alawami, Hyoungshick Kim. 205-219 [doi]
- IoT Checker Using Timing Side-Channel and Machine LearningKratika Sahu, Rasika Kshirsagar, Surbhi Vasudeva, Taghreed Alzahrani, Nima Karimian. 220-226 [doi]