ML-GS: Module Lattice-Based Group Signature Scheme
Deng Pan, Yatao Yang, Weitao Sun, Shuaibo Wang, Ke Wang
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Jibran Rasheed Khan, Sumaira Mustafa Qureshi, Farhan Ahmed Siddiqui, Syed Asim Ali
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Lakshmi Kuppusamy, B R Shankar, Cheng-Chi Lee
Volume 20 (2025): Issue 3 (December 2025)
A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Abdellatif Kichna, Abderrazak Farchane, Said Hakimi
(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Yogesh K. Meghrajani, Vishakha J. Kapadiya, Laxmi S. Desai
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Norshima Humaidi, Nurhafizah Zainal, Amirul Afif Muhamat
Volume 20 (2025): Issue 2 (September 2025)
Infrastructure as Code with Azure Bicep
Adora Nwodo
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs
Khushboo Jain
Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
Seyyed Mohsen Hashemi, Patrick C. K. Hung
Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions
Amira Talha, Tarek Frikha, Jalel Ktari, Habib Hamam