Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Khan, Jibran Rasheed, Qureshi, Sumaira Mustafa, Siddiqui, Farhan Ahmed, Ali, Syed Asim
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Kuppusamy, Lakshmi, Shankar, B R, Lee, Cheng-Chi
ML-GS: Module Lattice-Based Group Signature Scheme
Pan, Deng, Yang, Yatao, Sun, Weitao, Wang, Shuaibo, Wang, Ke
Volume 20 (2025): Issue 3 (December 2025)
(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Meghrajani, Yogesh K., Kapadiya, Vishakha J., Desai, Laxmi S.
A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Kichna, Abdellatif, Farchane, Abderrazak, Hakimi, Said
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Humaidi, Norshima, Zainal, Nurhafizah, Muhamat, Amirul Afif
Volume 20 (2025): Issue 2 (September 2025)
Infrastructure as Code with Azure Bicep
Nwodo, Adora
Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions
Talha, Amira, Frikha, Tarek, Ktari, Jalel, Hamam, Habib
Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
Hashemi, Seyyed Mohsen, Hung, Patrick C. K.
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs
Jain, Khushboo