A N-party authenticated group key distribution protocol using quantum-reflection architecture
In this paper, quantum reflection security protocol is studied and an n-party authenticated group key distribution protocol based on quantum-reflection architecture is proposed. The N-AGKDP can implement identity authentication between participants and ...
Obfuscated code is identifiable by a token-based code clone detection technique
Recently, developers use obfuscation techniques to make their code difficult to understand or analyse, especially malware developers. In Android applications, if the application is obfuscated, it is hard to retrieve the exact source code after applying ...
Safety monitoring of machinery equipment and fault diagnosis method based on support vector machine and improved evidence theory
Safe and reliable operation of machinery is the primary requirement of enterprise production and the basis for realising the economic benefits. Some of the fault diagnosis methods use evidence theory to determine the fault type by collecting the vibration ...
Hierarchical data partition defence against co-resident attacks
Co-resident attacks are one of the most dangerous types of attack in the cloud environment, posing a great threat to data security and survivability for users. The existing data partition-based and data backup solutions provide users with higher storage ...
Game theory approach for analysing attack graphs
Many real problems involve the simultaneous security of computer networks and systems as it penetrates all areas of our daily lives. The purpose of attack graph analysis is to be able to protect computer systems and networks against attacks related to ...
Augmenting the detection of online image theft using diagonal transformation and iris biometric watermarking
The digitisation of data has brought in various social media platforms where a lot of data are compromised every day. Likewise, there is a possibility of theft for every photo published online. Hence, the research work proposes an image theft detection ...
Privacy-preserving collaborative social network data publishing against colluding data providers
Preserving individuals' privacy is a vital issue in a collaborative social network data publishing setup. Existing data publishing approaches for collaborative social network data prevent identity disclosure and attribute disclosure performed by external ...
Correlation power analysis attack on software implementation of TRIVIUM stream cipher
Power analysis attacks are a category of attacks against cryptographic implementations. In this case, the power consumption of a cryptosystem is analysed to extract its secret values such as secret keys and key streams. This has become a huge threat to ...
Data breach: analysis, countermeasures and challenges
The increasing use or abuse of online personal data leads to a big data breach challenge for individuals, businesses, and even the government. Due to the scale of online data and the uncertainty of human factors, it is not feasible to build a practical ...
Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain
Machine learning is an extremely centralised platform and foments a skewed dynamic in which only a few people can utilise the enormous opportunities it provides. There is an absolute necessity to build a decentralised platform where the users may exchange ...