Cs-Cr
Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation
PQC: Triple Decomposition Problem Applied To GL(d, Fp) - A Secure Framework For Canonical Non-Commutative Cryptography
Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data
Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes
Understanding the influence of Individuals Self-efficacy for Information Systems Security Innovation Adoption: A Systematic Literature Review
Computing on Anonymous Quantum Network
Runtime Optimization of Identification Event in ECG Based Biometric Authentication
Simple Cellular Automata-Based Linear Models for the Shrinking Generator
Timelines for In-Code Discovery of Zero-Day Vulnerabilities and Supply-Chain Attacks
Physical and Mechatronic Security, Technologies and Future Trends for Vehicular Environment
Construction of wiretap codes from ordinary channel codes
Performance Evaluation of Cryptographic Ciphers on IoT Devices
User-Controlled Privacy-Preserving User Profile Data Sharing based on Blockchain
Detecting Danger: The Dendritic Cell Algorithm
Improved code-based identification scheme
Simulating Cyber-Attacks for Fun and Profit
Open Source Android Vulnerability Detection Tools: A Survey
Law-Aware Access Control and its Information Model
Android Inter-App Communication Threats, Solutions, and Challenges
Combinatorial Bounds and Characterizations of Splitting Authentication Codes
Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey
Adaptive Audio Watermarking via the Optimization Point of View on the Wavelet-Based Entropy