Guest Editorial: Advances in Secure Distributed and Network-Based Computing
Verifying Group Authentication Protocols by Scyther
Robust Decentralized Dierentially Private Stochastic Gradient Descent
Application Vulnerabilities in Risk Assessment and Management