Learn More
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently , many interactive and non-interactive deniable authentication protocols have been proposed. However,(More)
More and more malware writers are taking advantage of rootkits to shield their illegal activities. Any computer security products that are not equipped with the anti-rootkit functionality may not identify this kind of threat. Thus, the role of a rootkit detector is becoming extremely important. Though much research has been focused on kernel data to develop(More)
—Online social networks (OSNs) such as Facebook and MySpace are flourishing because more and more people are using OSNs to share their interests with friends. Because security and privacy issues on OSNs are major concerns, we propose a security framework for simultaneously authenticating multiple users to improve the efficiency and security of peer-to-peer(More)
The growing popularity of mobile devices such as smartphones and handsets has made mobile devices a more attractive target for mobile malware. Thus, the role of an anti-malware detector for effectively detecting mobile malware is becoming extremely important. In our previous work, we focused on constructing an ontology-based behavioral analysis for mobile(More)