All Stories

  1. A format-preserving encryption FF1, FF3-1 using lightweight block ciphers LEA and, SPECK
  2. Vulnerability analysis on the image‐based authentication: Through the WM_INPUT message
  3. A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT