Networking Analysis and Performance Comparison of Kubernetes CNI Plugins (Ritik Kumar, Munesh Chandra Trivedi).Pages 99-109Ĭlassifying Time-Bound Hierarchical Key Assignment Schemes (Vikas Rao Vadi, Naveen Kumar, Shafiqul Abidin).Pages 111-119Ī Survey on Cloud Workflow Collaborative Adaptive Scheduling (Delong Cui, Zhiping Peng, Qirui Li, Jieguang He, Lizi Zheng, Yiheng Yuan).Pages 121-129
On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN (Shafiqul Abidin, Vikas Rao Vadi, Ankur Rana).Pages 87-97 Khan).Pages 35-44įuture Identity Card Using Lattice-Based Cryptography and Steganography (Febrian Kurniawan, Gandeva Bayu Satrya).Pages 45-56Ĭryptanalysis on Attribute-Based Encryption from Ring-Learning with Error (R-LWE) (Tan Soo Fun, Azman Samsudin).Pages 57-64Įnhanced Password-Based Authentication Mechanism in Cloud Computing with Extended Honey Encryption (XHE): A Case Study on Diabetes Dataset (Tan Soo Fun, Fatimah Ahmedy, Zhi Ming Foo, Suraya Alias, Rayner Alfred).Pages 65-74Īn Enhanced Wireless Presentation System for Large-Scale Content Distribution (Khong-Neng Choong, Vethanayagam Chrishanton, Shahnim Khalid Putri).Pages 75-85
A Novel Crypto-Ransomware Family Classification Based on Horizontal Feature Simplification (Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha, Mohammad Dabbagh).Pages 3-14Ĭharacteristic Analysis and Experimental Simulation of Diffuse Link Channel for Indoor Wireless Optical Communication (Peinan He, Mingyou He).Pages 15-33Ī Comparative Analysis of Malware Anomaly Detection (Priynka Sharma, Kaylash Chaudhary, Michael Wagner, M.