Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

    Isha Sood*, Varsha Sharma

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2791-2818, 2024, DOI:10.32604/cmc.2024.055463 - 18 November 2024

    Abstract Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method More >

  • Open Access

    ARTICLE

    NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing

    Asma Ibrahim Hussein1,*, Abeer Tariq MaoLood2, Ekhlas Khalaf Gbashi2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 753-769, 2023, DOI:10.32604/cmc.2023.039804 - 08 June 2023

    Abstract With the advent of quantum computing, numerous efforts have been made to standardize post-quantum cryptosystems with the intention of (eventually) replacing Elliptic Curve Cryptography (ECC) and Rivets-Shamir-Adelman (RSA). A modified version of the traditional N-Th Degree Truncated Polynomial Ring (NTRU) cryptosystem called NTRU Prime has been developed to reduce the attack surface. In this paper, the Signcryption scheme was proposed, and it is most efficient than others since it reduces the complexity and runs the time of the code execution, and at the same time, provides a better security degree since it ensures the integrity… More >

  • Open Access

    ARTICLE

    Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm

    Faguo Wu1,2,3,4,*, Bo Zhou2, Jie Jiang5, Tianyu Lei1, Jiale Song1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 957-973, 2023, DOI:10.32604/cmc.2023.038771 - 08 June 2023

    Abstract With the rapid increase in demand for data trustworthiness and data security, distributed data storage technology represented by blockchain has received unprecedented attention. These technologies have been suggested for various uses because of their remarkable ability to offer decentralization, high autonomy, full process traceability, and tamper resistance. Blockchain enables the exchange of information and value in an untrusted environment. There has been a significant increase in attention to the confidentiality and privacy preservation of blockchain technology. Ensuring data privacy is a critical concern in cryptography, and one of the most important protocols used to achieve… More >

  • Open Access

    ARTICLE

    Code-based Sequential Aggregate Signature Scheme

    Bennian Dou1,*, Lei Xu1, Xiaoling Yu2, Lin Mei1, Cong Zuo3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5219-5231, 2022, DOI:10.32604/cmc.2022.030270 - 28 July 2022

    Abstract This paper proposes the first code-based quantum immune sequential aggregate signature (SAS) scheme and proves the security of the proposed scheme in the random oracle model. Aggregate signature (AS) schemes and sequential aggregate signature schemes allow a group of potential signers to sign different messages respectively, and all the signatures of those users on those messages can be aggregated into a single signature such that the size of the aggregate signature is much smaller than the total size of all individual signatures. Because of the aggregation of many signatures into a single short signature, AS… More >

Displaying 1-10 on page 1 of 4. Per Page