|
|
|
by Ravali Chennamneni and Rajitha
Devabhaktuni |
|
Security
of Transactions Performed Using Credit Card Readers
for Smartphones and Tablets |
|
by Komrabai Kargbo |
Securing Card-Not-Present Transactions Through EMV Authentication | |
by Matthew Carter and Brienne Douglas |
|
High-Speed
Implementation of Authenticated Ciphers Competing in
the CAESAR Contest |
|
by Abubakr Abdulgadir |
Analysis
and Pipelined Implementation of Selected
Parallelizable CAESAR Candidates |
|
|
by Sanjay Deshpande |
|
|
|
by Farnoud Farahmand |
|
|
|
by Amit Singh |
Anti-Counterfeiting
of Integrated Circuits: RFID Tags as a Countermeasure |
|
by Sathya Kanth Vardhanapu |
|
|
|
by Shawn Wilkinson |
|
Overview and Comparison of Open Source Cryptographic Libraries |
|
by Cong Chen and Yuqi Wang |
Overview
and Comparison of Open Crypto Libraries for
Application Development |
|
by Ravi Kota |
|
|
|
by Richard Joy |
|
|
|
by Tejas Sontakke, Anamika Kesharwani,
and Deepika Mallappa |
|
|
|
by Ernest Kushevski |
|
|
|
by Michael Risher |
|
Alice’s Jewelry Store -Educational Multi-media Presentation on Fully Homomorphic Encryption |
|
by Uday Kumar Vatti, Naga Navya Mingu,
and Preethi Kondaprithviraj |
Security
of Vehicle-to-Vehicle Communication Networks |
|
by Krishna Nikhila Kalinga and Daniel May |
|
|
|
by Brian Maher |
|
Parameters Optimization of Post-Quantum Cryptography Schemes |
|
by Qing Chen |