| Analysis of a New Improved AES S-box Structure | Rong CHENG |
| Romeo: SGX-based Software Anti-Piracy Framework | Yanning Du |
| BSSD:A Blockchain-based Trusted Storage Mechanism for Business Data to Support Sustainable Development | Ruyan Liu |
| User Authentication Using Body Vibration Characteristics | Yuxuan Zhang |
| Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture | Haiyan Cao |
| An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server | Yongliu Ma |
| A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain | Yuanzhen Liu |
| Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice | wang jinhua |
| Network Situation Awareness Model based on Incomplete Information Game | 尹 彦 |
| Social Internet of Tings trust management based on implicit social relationship | Fan Fan |
| Cross-chain Data Auditing for Medical IoT Data Sharing | Kuan Fan |
| Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT | Chen Wang |
| P-TECS Opportunistic Routing Algorithm Integrating Multiple Node Attributes | Gang Xu |