Accepted papers

A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones
Chen, Siyu (Monash University); Cui, Shujie (Monash University); Liu, Joseph (Monash University)

A usability study of modern cryptographic APIs
Luo, Junwei (RMIT University); Yi, Xun (RMIT University); Han, Fengling (RMIT University, Australia); Yang, Xuechao (RMIT University)

Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning
Xu, Chengyao (Monash University); Lai, Shangqi (Monash University)

Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability
Ziaur, Rahman (RMIT University); Yi, Xun (RMIT University); Khalil, Ibrahim (RMIT University, Melbourne Australia); Kelarev, Andrei (RMIT University)

Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
Ziaur, Rahman (RMIT University); Yi, Xun (RMIT University); Khalil, Ibrahim (RMIT University, Melbourne Australia); Sumi, Mousumi (Dynamic Solution Innovators (DSI) Limited)

DBS: Blockchain-based privacy-preserving RBAC in IoT
Li, Xianxian (College of Computer Science, Guangxi Normal University); Yang, Junhao (Guangxi Normal University); Gao, Shiqi (Guangxi normal univercity); Shi, Zhenkui (Guangxi Normal University); Li, Jie (Guangxi Normal University); Fu, Xuemei (Guangxi Normal University)

FADT-Chain:Achieving fair and accountable data trading scheme for educational multimedia data based on blockchain
Li, Xianxian (College of Computer Science and Information Technology, Guangxi Normal University); Peng, Jiahui (Guangxi Normal University); Shi, Zhenkui (Guangxi Normal University)

FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation
Thapa, Chandra (CSIRO Data61); Karmakar, Kallol Krishna (The University of Newcastle, Australia); Celdran, Alberto Huertas (University of Zurich, Switzerland); Camtepe, Seyit (CSIRO Data61, Australia); Varadharajan, Vijay (The University of Newcastle, Australia); Nepal, Surya (CSIRO Data61, Australia)

Memory-effcient Encrypted Search using Trusted Execution Environment
Vo, Viet (Monash University)

Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy
Zhao, Yu (Nanjing University of Science and Technology); Xu, Chungen (Nanjing University of Science and Technology); Mei, Lin (Nanjing University of Science and Technology); Zhang, Pan (Nanjing University of Science and Technology)

Puncturable Search: Enabling Authorized Search in Cross-data Federation
Mei, Lin (Nanjing University of Science and Technology); Xu, Chungen (Nanjing University of Science and Technology); Li, Qianmu (Nanjing University of Science and Technology)

The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function
Sommervoll, Åvald (University of Oslo)

Topology Validator – Defense against Topology Poisoning Attack in SDN
Kumar, Abhay (IIT Kanpur); Shukla, Sandeep (Indian Institute of Technology Kanpur)

Towards an Attention-based Accurate Intrusion Detection Approach
Dey, Arunavo (Bangladesh University of Business and Technology); Hossain, Md. Shohrab (Bangladesh University of Engineering and Technology); Hoq, Md. Nazmul (Concordia University); Majumdar, Suryadipta (Concordia University)

Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics
Lian, Rui (City University of Hong Kong); Zhou, Anxin (City University of Hong Kong); Zheng, Yifeng (Harbin Institute of Technology, Shenzhen); Wang, Cong (City University of Hong Kong)

An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher
Rana, Muhammad (Charles Sturt University); Mamun, Quazi (Charles Sturt University); Islam, Rafiqul (Charles Sturt University)

Anti-eavesdropping Proportional Fairness Access Control for 5G Networks
Ghosh, Shankar Kumar (Presidency University, Bangalore 560064, India); Das, Avirup (Indian Statistical Institute, Kolkata 700108, India); Ghosh, Sasthi Charan (Indian Statistical Institute, Kolkata 700108, India); Das, Nabanita (Indian Statistical Institute, Kolkata 700108, India)

Avoiding VPN Bottlenecks: Exploring Network-Level Client Identity Validation Options
Liu, Yu (Worcester Polytechnic Institute); Shue, Craig (Worcester Polytechnic Institute)

Joint Relay Selection and Frequency Allocationfor D2D Communications
Dutta, Rathindra Nath (Indian Statistical Institute); Ghosh, Sasthi C. (Indian Statistical Institute)

Toward Achieving Unanimity for Implicit Closings in a Trustless System
Imamura, Mitsuyoshi (University of Tsukuba); Omote, Kazumasa (University of Tsukuba/National Institute of Information and Communications Technology)