ML-GS: Module Lattice-Based Group Signature Scheme
Deng Pan, Yatao Yang, Weitao Sun, Shuaibo Wang, Ke Wang
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Lakshmi Kuppusamy, B R Shankar, Cheng-Chi Lee
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Jibran Rasheed Khan, Sumaira Mustafa Qureshi, Farhan Ahmed Siddiqui, Syed Asim Ali
Volume 20 (2025): Issue 3 (December 2025)
A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Abdellatif Kichna, Abderrazak Farchane, Said Hakimi
(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Yogesh K. Meghrajani, Vishakha J. Kapadiya, Laxmi S. Desai
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Norshima Humaidi, Nurhafizah Zainal, Amirul Afif Muhamat
Volume 20 (2025): Issue 2 (September 2025)
Infrastructure as Code with Azure Bicep
Adora Nwodo
Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
Seyyed Mohsen Hashemi, Patrick C. K. Hung
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs
Khushboo Jain
Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions
Amira Talha, Tarek Frikha, Jalel Ktari, Habib Hamam