Have a personal or library account? Click to login

Showing 1-12 of 128

Clear all
Subject:
Theoretical computer sciences
ML-GS: Module Lattice-Based Group Signature Scheme
Article

ML-GS: Module Lattice-Based Group Signature Scheme

Pan, Deng, Yang, Yatao, Sun, Weitao, Wang, Shuaibo, Wang, Ke
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Article

A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions

Kuppusamy, Lakshmi, Shankar, B R, Lee, Cheng-Chi
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Article

Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering

Khan, Jibran Rasheed, Qureshi, Sumaira Mustafa, Siddiqui, Farhan Ahmed, Ali, Syed Asim
Volume 20 (2025): Issue 3 (December 2025)
Issue

Volume 20 (2025): Issue 3 (December 2025)

(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Article

(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares

Meghrajani, Yogesh K., Kapadiya, Vishakha J., Desai, Laxmi S.
A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Article

A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem

Kichna, Abdellatif, Farchane, Abderrazak, Hakimi, Said
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Article

Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI

Humaidi, Norshima, Zainal, Nurhafizah, Muhamat, Amirul Afif
Volume 20 (2025): Issue 2 (September 2025)
Issue

Volume 20 (2025): Issue 2 (September 2025)

Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
Article

Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation

Hashemi, Seyyed Mohsen, Hung, Patrick C. K.
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs
Article

Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs

Jain, Khushboo
Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions
Article

Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions

Talha, Amira, Frikha, Tarek, Ktari, Jalel, Hamam, Habib
Fermat Encoding in S-Box for Secured Encryption
Article

Fermat Encoding in S-Box for Secured Encryption

Hasanujjaman, Md., Goswami, Partha Sarathi