ML-GS: Module Lattice-Based Group Signature Scheme
Deng Pan, Yatao Yang, Weitao Sun, Shuaibo Wang, Ke Wang
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Jibran Rasheed Khan, Sumaira Mustafa Qureshi, Farhan Ahmed Siddiqui, Syed Asim Ali
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Lakshmi Kuppusamy, B R Shankar, Cheng-Chi Lee
Volume 20 (2025): Issue 3 (December 2025)
Digital Deception: Uncovering the Dark Side of AI in Social Networks
Rupa Rani, Prashant Upadhyay, Rohit Sahu, Satya Prakash Yadav, Hardeo Kumar Thakur
A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Abdellatif Kichna, Abderrazak Farchane, Said Hakimi
(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Yogesh K. Meghrajani, Vishakha J. Kapadiya, Laxmi S. Desai
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Norshima Humaidi, Nurhafizah Zainal, Amirul Afif Muhamat
Volume 20 (2025): Issue 2 (September 2025)
Palo Alto Networks from Policy to Code
Nikolay Matveev, Irshad Burtally
Microsoft Security Copilot
Bi Yue Xu, Patrick Lane
Indistinguishability Obfuscation from Well-Studied Assumptions
Aayush Jain