Malware classification based on API calls and behaviour analysis
This study presents the runtime behaviour‐based classification procedure for Windows malware. Runtime behaviours are extracted with a particular focus on the determination of a malicious sequence of application programming interface (API) calls in ...
Analysis of the adoption of security headers in HTTP
With the increase in the number of threats within web‐based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man‐in‐the‐middle attacks, code injection, ...
Cryptanalysis of Morillo–Obrador polynomial delegation schemes
Verifiable computation (VC) allows a client to outsource (delegate) the computation of a function f on an input x to a server and then verify the server's results with substantially less time than computing f (x) from scratch. The security of VC requires ...
Formal analysis of HMAC authorisation in the TPM2.0 specification
The Trusted Platform Module (TPM) is a system component that provides a hardware‐based approach to establish trust in a platform. The latest TPM2.0 specification was accepted as the ISO standard in 2015. It offers functionality for key management by ...
Efficient revocable and grantable attribute‐based encryption from lattices with fine‐grained access control
Attribute‐based encryption (ABE) has been regarded as an attractive alternative to identity‐based encryption. The feature of the ABE is that it has the ability of fine‐grained access control. Access control is an effective way to ensure data security. ...
Efficient identity‐based blind message recovery signature scheme from pairings
Blind signature (BS) schemes are a vital tool to design electronic cash (e‐cash), online transaction, electronic voting (e‐voting), digital right management (DRM) systems etc. The communication systems designed for such applications need small size and ...
CCN framework with privacy support
Content‐centric networking (CCN) used the name of an Interest to seek the target content, where the name was a plaintext and unprotected. Apart from the name, the content in one Data is also unprotected. If an unauthorised node intercepted an Interest, it ...