|
1
|
An efficient decentralized and verifiable stake voting system
|
Amalan Antony, Pavithra Gurushankar
|
|
2
|
Breaking Boundaries: A Security Analysis of Android’s IPC Vulnerabilities
|
Anirudh Suri, Anil Saini and Manoj Singh Gaur
|
|
3
|
Dissecting ValleyRAT: From Analysis to Memory-Centric Detection
|
Kartik Iyer, Parag Rughani and Shaurya Shaurya
|
|
4
|
Federated Malware Detection across PE and non-PE File Formats
|
Niharika Pagare and Dr. Mukti Padhya
|
|
5
|
An Efficient Blockchain-based E-voting Protocol with Improved Voter Anonymity
|
Bhakti Dhorajiya, Arti Dhiman and Souradyuti Paul
|
|
6
|
Privacy Technologies: Sectoral Deployments and Quantum Risks
|
Veniamin Boiarkin and Muttukrishnan Rajarajan
|
|
7
|
Post-Quantum Security Readiness Across Digital Supply Chains
|
Tooba Qasim, Veniamin Boiarkin, and Muttukrishnan Rajarajan
|
|
8
|
Security in the Era of Perceptive Networks: A Comprehensive Taxonomic Framework for Integrated Sensing and Communication Security
|
Chandra Thapa and Surya Nepal
|
|
9
|
Hidden Hybrid Symmetric Key Cipher
|
Rajeeva Laxman Karandikar
|
|
10
|
Challenges in Detecting Cryptographic Backdoor Attacks on Neural Networks
|
Subhadeep Dalui, Shubhi Shukla, and Debdeep Mukhopadhyay
|