Efficient verifiable computation over quotient polynomial rings Jai Hyun ParkJung Hee CheonDongwoo Kim regular contribution 21 April 2022 Pages: 953 - 971
IntentAuth: Securing Android’s Intent-based inter-process communication Christos LyvasCostas LambrinoudakisDimitris Geneiatakis regular contribution 22 April 2022 Pages: 973 - 982
A Digital Asset Inheritance Model to Convey Online Persona Posthumously Ram Govind SinghAnanya ShrivastavaSushmita Ruj Regular Contribution 30 April 2022 Pages: 983 - 1003
BitCracker: BitLocker meets GPUs E. AgostiniM. Bernaschi regular contribution 03 May 2022 Pages: 1005 - 1018
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV” Ilyes AhmimNacira Ghoualmi-ZineMarwa Ahmim regular contribution 07 May 2022 Pages: 1019 - 1026
Algorithm substitution attacks against receivers Marcel ArmourBertram Poettering Regular contribution Open access 21 June 2022 Pages: 1027 - 1050
ANS-based compression and encryption with 128-bit security Seyit CamtepeJarek DudaJosef Pieprzyk Regular Contribution Open access 13 July 2022 Pages: 1051 - 1067
Highly private blockchain-based management system for digital COVID-19 certificates Rosa Pericàs-GornalsMacià Mut-PuigserverM. Magdalena Payeras-Capellà regular contribution Open access 29 July 2022 Pages: 1069 - 1090
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats Vasileios VlachosYannis C. StamatiouSotiris Nikoletseas Regular contribution 03 August 2022 Pages: 1091 - 1106
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries Beyza CevikNur AltiparmakSevil Sen Regular contribution 04 August 2022 Pages: 1107 - 1125
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls Hiroki InayoshiShohei KakeiShoichi Saito Regular contribution 06 August 2022 Pages: 1127 - 1149
An anonymous and unlinkable electronic toll collection system Ricard BorgesFrancesc SebéMagda Valls Regular contribution 06 August 2022 Pages: 1151 - 1162
A survey on interest packet flooding attacks and its countermeasures in named data networking Rabari JeetP. Arun Raj Kumar Survey 23 April 2022 Pages: 1163 - 1187
Classifying resilience approaches for protecting smart grids against cyber threats Andrew D. SyrmakesisCristina AlcarazNikos D. Hatziargyriou Survey Open access 06 May 2022 Pages: 1189 - 1210