ML-GS: Module Lattice-Based Group Signature Scheme
Pan, Deng, Yang, Yatao, Sun, Weitao, Wang, Shuaibo, Wang, Ke
A Novel Forward-Secure Key Establishment Protocol from Physically Related Functions
Kuppusamy, Lakshmi, Shankar, B R, Lee, Cheng-Chi
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Khan, Jibran Rasheed, Qureshi, Sumaira Mustafa, Siddiqui, Farhan Ahmed, Ali, Syed Asim
Volume 20 (2025): Issue 3 (December 2025)
(n, n) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Meghrajani, Yogesh K., Kapadiya, Vishakha J., Desai, Laxmi S.
A Novel Approach to Bit-Flipping Threshold Selection with Particle Swarm Optimization in the QC-MDPC-McEliece Cryptosystem
Kichna, Abdellatif, Farchane, Abderrazak, Hakimi, Said
Mapping the Landscape of Information Security Risk Management Research: A Bibliometric Analysis Using VOS Viewer and Power BI
Humaidi, Norshima, Zainal, Nurhafizah, Muhamat, Amirul Afif
Volume 20 (2025): Issue 2 (September 2025)
Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
Hashemi, Seyyed Mohsen, Hung, Patrick C. K.
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs
Jain, Khushboo
Revolutionizing Tunisian Agricultural Traceability with Blockchain: Exploring Aries and Ethereum Solutions
Talha, Amira, Frikha, Tarek, Ktari, Jalel, Hamam, Habib
Fermat Encoding in S-Box for Secured Encryption
Hasanujjaman, Md., Goswami, Partha Sarathi