Have a personal or library account? Click to login

Showing 1-12 of 252

Clear all
Subject:
IT-security and cryptology
ML-GS: Module Lattice-Based Group Signature Scheme
Article

ML-GS: Module Lattice-Based Group Signature Scheme

Deng Pan, Yatao Yang, Weitao Sun, Shuaibo Wang, Ke Wang
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Article

Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering

Jibran Rasheed Khan, Sumaira Mustafa Qureshi, Farhan Ahmed Siddiqui, Syed Asim Ali
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Article

A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions

Lakshmi Kuppusamy, B R Shankar, Cheng-Chi Lee
Volume 20 (2025): Issue 3 (December 2025)
Issue

Volume 20 (2025): Issue 3 (December 2025)

Digital Deception: Uncovering the Dark Side of AI in Social Networks
Book
New

Digital Deception: Uncovering the Dark Side of AI in Social Networks

Rupa Rani, Prashant Upadhyay, Rohit Sahu, Satya Prakash Yadav, Hardeo Kumar Thakur
A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Article

A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem

Abdellatif Kichna, Abderrazak Farchane, Said Hakimi
(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Article

(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares

Yogesh K. Meghrajani, Vishakha J. Kapadiya, Laxmi S. Desai
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Article

Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI

Norshima Humaidi, Nurhafizah Zainal, Amirul Afif Muhamat
Volume 20 (2025): Issue 2 (September 2025)
Issue

Volume 20 (2025): Issue 2 (September 2025)

Palo Alto Networks from Policy to Code
Book

Palo Alto Networks from Policy to Code

Nikolay Matveev, Irshad Burtally
Microsoft Security Copilot
Book

Microsoft Security Copilot

Bi Yue Xu, Patrick Lane
Indistinguishability Obfuscation from Well-Studied Assumptions
Book

Indistinguishability Obfuscation from Well-Studied Assumptions

Aayush Jain