Authentication Gravitational Search For Designing A Fuzzy Rule-Based Classifiers For Handwritten Signature Verification/Open Call Articles Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things/Open Call Articles Delivery of a Certified E-mail Service over the Digital Terrestrial Television Platform/Open Call Articles DSA with SHA-1 for Space Telecommand Authentication: Analysis and Results/Open Call Articles