Encryption and Re-Randomization Techniques for Malware Propagation Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1109/access.2021.3112750
Encryption, which is essential for the protection of sensitive information can also transform any malicious content to illegible form, which can then reside in any network, undetected. Encryption of malicious payload is used by malware authors to mask their code, however, the objective of hiding the malicious code can be further improved by techniques of re-randomization. The concept of re-randomization using asymmetric cryptography has been emerged as a new area of interest for malware designers. Re-randomizing is a technique which can prevent detection of source path of a malware and makes it indistinguishable. This article extends the idea of using asymmetric cryptography for re-randomization and has proposed a novel scheme using Pailliar’s asymmetric cryptosystem. Moreover, this research work illustrates the limitations of RSA for malware re-randomization. A comprehensive performance analysis of the re-randomization techniques for various malware payloads is also presented, which can be used for the detection of re-randomized malware effectively.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/access.2021.3112750
- https://ieeexplore.ieee.org/ielx7/6287639/6514899/09537770.pdf
- OA Status
- gold
- Cited By
- 2
- References
- 24
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3200567911
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3200567911Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/access.2021.3112750Digital Object Identifier
- Title
-
Encryption and Re-Randomization Techniques for Malware PropagationWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-01-01Full publication date if available
- Authors
-
Ahsan Rasheed Abbasi, Mehreen Afzal, Waseem Iqbal, Shynar Mussiraliyeva, Fawad Khan, Awais Ur RehmanList of authors in order
- Landing page
-
https://doi.org/10.1109/access.2021.3112750Publisher landing page
- PDF URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/09537770.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/09537770.pdfDirect OA link when available
- Concepts
-
Malware, Computer science, Encryption, Cryptography, Payload (computing), Randomization, Cryptosystem, Computer security, Theoretical computer science, Randomized controlled trial, Surgery, Network packet, MedicineTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 2Per-year citation counts (last 5 years)
- References (count)
-
24Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3200567911 |
|---|---|
| doi | https://doi.org/10.1109/access.2021.3112750 |
| ids.doi | https://doi.org/10.1109/access.2021.3112750 |
| ids.mag | 3200567911 |
| ids.openalex | https://openalex.org/W3200567911 |
| fwci | 0.28795905 |
| type | article |
| title | Encryption and Re-Randomization Techniques for Malware Propagation |
| biblio.issue | |
| biblio.volume | 9 |
| biblio.last_page | 132532 |
| biblio.first_page | 132522 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9997000098228455 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T10951 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9991999864578247 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptographic Implementations and Security |
| is_xpac | False |
| apc_list.value | 1850 |
| apc_list.currency | USD |
| apc_list.value_usd | 1850 |
| apc_paid.value | 1850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1850 |
| concepts[0].id | https://openalex.org/C541664917 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8246414661407471 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q14001 |
| concepts[0].display_name | Malware |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8048095107078552 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C148730421 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6828261613845825 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[2].display_name | Encryption |
| concepts[3].id | https://openalex.org/C178489894 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6760704517364502 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[3].display_name | Cryptography |
| concepts[4].id | https://openalex.org/C134066672 |
| concepts[4].level | 3 |
| concepts[4].score | 0.6755650043487549 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1424639 |
| concepts[4].display_name | Payload (computing) |
| concepts[5].id | https://openalex.org/C204243189 |
| concepts[5].level | 3 |
| concepts[5].score | 0.561271607875824 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1363085 |
| concepts[5].display_name | Randomization |
| concepts[6].id | https://openalex.org/C6295992 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5150151252746582 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q976521 |
| concepts[6].display_name | Cryptosystem |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.5019283294677734 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C80444323 |
| concepts[8].level | 1 |
| concepts[8].score | 0.38311848044395447 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[8].display_name | Theoretical computer science |
| concepts[9].id | https://openalex.org/C168563851 |
| concepts[9].level | 2 |
| concepts[9].score | 0.06811371445655823 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1436668 |
| concepts[9].display_name | Randomized controlled trial |
| concepts[10].id | https://openalex.org/C141071460 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q40821 |
| concepts[10].display_name | Surgery |
| concepts[11].id | https://openalex.org/C158379750 |
| concepts[11].level | 2 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[11].display_name | Network packet |
| concepts[12].id | https://openalex.org/C71924100 |
| concepts[12].level | 0 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[12].display_name | Medicine |
| keywords[0].id | https://openalex.org/keywords/malware |
| keywords[0].score | 0.8246414661407471 |
| keywords[0].display_name | Malware |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8048095107078552 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/encryption |
| keywords[2].score | 0.6828261613845825 |
| keywords[2].display_name | Encryption |
| keywords[3].id | https://openalex.org/keywords/cryptography |
| keywords[3].score | 0.6760704517364502 |
| keywords[3].display_name | Cryptography |
| keywords[4].id | https://openalex.org/keywords/payload |
| keywords[4].score | 0.6755650043487549 |
| keywords[4].display_name | Payload (computing) |
| keywords[5].id | https://openalex.org/keywords/randomization |
| keywords[5].score | 0.561271607875824 |
| keywords[5].display_name | Randomization |
| keywords[6].id | https://openalex.org/keywords/cryptosystem |
| keywords[6].score | 0.5150151252746582 |
| keywords[6].display_name | Cryptosystem |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.5019283294677734 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[8].score | 0.38311848044395447 |
| keywords[8].display_name | Theoretical computer science |
| keywords[9].id | https://openalex.org/keywords/randomized-controlled-trial |
| keywords[9].score | 0.06811371445655823 |
| keywords[9].display_name | Randomized controlled trial |
| language | en |
| locations[0].id | doi:10.1109/access.2021.3112750 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2485537415 |
| locations[0].source.issn | 2169-3536 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2169-3536 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | IEEE Access |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09537770.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Access |
| locations[0].landing_page_url | https://doi.org/10.1109/access.2021.3112750 |
| locations[1].id | pmh:oai:doaj.org/article:78ab9dc9744748bea97995a29dd71aa2 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | IEEE Access, Vol 9, Pp 132522-132532 (2021) |
| locations[1].landing_page_url | https://doaj.org/article/78ab9dc9744748bea97995a29dd71aa2 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5080236199 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-3567-5476 |
| authorships[0].author.display_name | Ahsan Rasheed Abbasi |
| authorships[0].countries | PK |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I929597975 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[0].institutions[0].id | https://openalex.org/I929597975 |
| authorships[0].institutions[0].ror | https://ror.org/03w2j5y17 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I929597975 |
| authorships[0].institutions[0].country_code | PK |
| authorships[0].institutions[0].display_name | National University of Sciences and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ahsan Rasheed Abbasi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[1].author.id | https://openalex.org/A5074111881 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2179-9259 |
| authorships[1].author.display_name | Mehreen Afzal |
| authorships[1].countries | PK |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I929597975 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[1].institutions[0].id | https://openalex.org/I929597975 |
| authorships[1].institutions[0].ror | https://ror.org/03w2j5y17 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I929597975 |
| authorships[1].institutions[0].country_code | PK |
| authorships[1].institutions[0].display_name | National University of Sciences and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Mehreen Afzal |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[2].author.id | https://openalex.org/A5032009749 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-3616-2621 |
| authorships[2].author.display_name | Waseem Iqbal |
| authorships[2].countries | PK |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I929597975 |
| authorships[2].affiliations[0].raw_affiliation_string | [Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan] |
| authorships[2].institutions[0].id | https://openalex.org/I929597975 |
| authorships[2].institutions[0].ror | https://ror.org/03w2j5y17 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I929597975 |
| authorships[2].institutions[0].country_code | PK |
| authorships[2].institutions[0].display_name | National University of Sciences and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Waseem Iqbal |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | [Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan] |
| authorships[3].author.id | https://openalex.org/A5010428028 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-5794-3649 |
| authorships[3].author.display_name | Shynar Mussiraliyeva |
| authorships[3].countries | PK |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I929597975 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[3].institutions[0].id | https://openalex.org/I929597975 |
| authorships[3].institutions[0].ror | https://ror.org/03w2j5y17 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I929597975 |
| authorships[3].institutions[0].country_code | PK |
| authorships[3].institutions[0].display_name | National University of Sciences and Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Shynar Mussiraliyeva |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[4].author.id | https://openalex.org/A5022985909 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-6609-5928 |
| authorships[4].author.display_name | Fawad Khan |
| authorships[4].countries | PK |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I929597975 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[4].institutions[0].id | https://openalex.org/I929597975 |
| authorships[4].institutions[0].ror | https://ror.org/03w2j5y17 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I929597975 |
| authorships[4].institutions[0].country_code | PK |
| authorships[4].institutions[0].display_name | National University of Sciences and Technology |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Fawad Khan |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Information Security, National University of Sciences and Technology, Islamabad 44000, Pakistan. |
| authorships[5].author.id | https://openalex.org/A5045593480 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-6925-9641 |
| authorships[5].author.display_name | Awais Ur Rehman |
| authorships[5].countries | KZ |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I185571130 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Information Systems, Al-Farabi Kazkah National University, Almaty, Kazakhstan. |
| authorships[5].institutions[0].id | https://openalex.org/I185571130 |
| authorships[5].institutions[0].ror | https://ror.org/03q0vrn42 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I185571130 |
| authorships[5].institutions[0].country_code | KZ |
| authorships[5].institutions[0].display_name | Al-Farabi Kazakh National University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Awais Ur Rehman |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Information Systems, Al-Farabi Kazkah National University, Almaty, Kazakhstan. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09537770.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Encryption and Re-Randomization Techniques for Malware Propagation |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W1535080110, https://openalex.org/W2097492617, https://openalex.org/W306312984, https://openalex.org/W857189463, https://openalex.org/W2753240997, https://openalex.org/W2029021368, https://openalex.org/W4232705780, https://openalex.org/W2965484163, https://openalex.org/W2512006651, https://openalex.org/W2096221836 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 2 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1109/access.2021.3112750 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2485537415 |
| best_oa_location.source.issn | 2169-3536 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2169-3536 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | IEEE Access |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09537770.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Access |
| best_oa_location.landing_page_url | https://doi.org/10.1109/access.2021.3112750 |
| primary_location.id | doi:10.1109/access.2021.3112750 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2485537415 |
| primary_location.source.issn | 2169-3536 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2169-3536 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | IEEE Access |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09537770.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Access |
| primary_location.landing_page_url | https://doi.org/10.1109/access.2021.3112750 |
| publication_date | 2021-01-01 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2056489112, https://openalex.org/W6675258758, https://openalex.org/W1534388293, https://openalex.org/W6715073074, https://openalex.org/W6600881564, https://openalex.org/W6750003459, https://openalex.org/W6602663285, https://openalex.org/W233279079, https://openalex.org/W2132172731, https://openalex.org/W2154871153, https://openalex.org/W1581827225, https://openalex.org/W2470029541, https://openalex.org/W2047181172, https://openalex.org/W2143156479, https://openalex.org/W2159128662, https://openalex.org/W1497974906, https://openalex.org/W2132874238, https://openalex.org/W2972552958, https://openalex.org/W65966743, https://openalex.org/W21820574, https://openalex.org/W2410792873, https://openalex.org/W2108834246, https://openalex.org/W2794898013, https://openalex.org/W2103742248 |
| referenced_works_count | 24 |
| abstract_inverted_index.A | 126 |
| abstract_inverted_index.a | 67, 77, 87, 107 |
| abstract_inverted_index.as | 66 |
| abstract_inverted_index.be | 49, 143 |
| abstract_inverted_index.by | 33, 52 |
| abstract_inverted_index.in | 23 |
| abstract_inverted_index.is | 2, 31, 76, 138 |
| abstract_inverted_index.it | 91 |
| abstract_inverted_index.of | 7, 28, 43, 54, 58, 70, 83, 86, 98, 121, 130, 148 |
| abstract_inverted_index.to | 16, 36 |
| abstract_inverted_index.RSA | 122 |
| abstract_inverted_index.The | 56 |
| abstract_inverted_index.and | 89, 104 |
| abstract_inverted_index.any | 13, 24 |
| abstract_inverted_index.can | 10, 20, 48, 80, 142 |
| abstract_inverted_index.for | 4, 72, 102, 123, 134, 145 |
| abstract_inverted_index.has | 63, 105 |
| abstract_inverted_index.new | 68 |
| abstract_inverted_index.the | 5, 41, 45, 96, 119, 131, 146 |
| abstract_inverted_index.This | 93 |
| abstract_inverted_index.also | 11, 139 |
| abstract_inverted_index.area | 69 |
| abstract_inverted_index.been | 64 |
| abstract_inverted_index.code | 47 |
| abstract_inverted_index.idea | 97 |
| abstract_inverted_index.mask | 37 |
| abstract_inverted_index.path | 85 |
| abstract_inverted_index.then | 21 |
| abstract_inverted_index.this | 115 |
| abstract_inverted_index.used | 32, 144 |
| abstract_inverted_index.work | 117 |
| abstract_inverted_index.code, | 39 |
| abstract_inverted_index.form, | 18 |
| abstract_inverted_index.makes | 90 |
| abstract_inverted_index.novel | 108 |
| abstract_inverted_index.their | 38 |
| abstract_inverted_index.using | 60, 99, 110 |
| abstract_inverted_index.which | 1, 19, 79, 141 |
| abstract_inverted_index.hiding | 44 |
| abstract_inverted_index.reside | 22 |
| abstract_inverted_index.scheme | 109 |
| abstract_inverted_index.source | 84 |
| abstract_inverted_index.article | 94 |
| abstract_inverted_index.authors | 35 |
| abstract_inverted_index.concept | 57 |
| abstract_inverted_index.content | 15 |
| abstract_inverted_index.emerged | 65 |
| abstract_inverted_index.extends | 95 |
| abstract_inverted_index.further | 50 |
| abstract_inverted_index.malware | 34, 73, 88, 124, 136, 150 |
| abstract_inverted_index.payload | 30 |
| abstract_inverted_index.prevent | 81 |
| abstract_inverted_index.various | 135 |
| abstract_inverted_index.analysis | 129 |
| abstract_inverted_index.however, | 40 |
| abstract_inverted_index.improved | 51 |
| abstract_inverted_index.interest | 71 |
| abstract_inverted_index.network, | 25 |
| abstract_inverted_index.payloads | 137 |
| abstract_inverted_index.proposed | 106 |
| abstract_inverted_index.research | 116 |
| abstract_inverted_index.Moreover, | 114 |
| abstract_inverted_index.detection | 82, 147 |
| abstract_inverted_index.essential | 3 |
| abstract_inverted_index.illegible | 17 |
| abstract_inverted_index.malicious | 14, 29, 46 |
| abstract_inverted_index.objective | 42 |
| abstract_inverted_index.sensitive | 8 |
| abstract_inverted_index.technique | 78 |
| abstract_inverted_index.transform | 12 |
| abstract_inverted_index.Encryption | 27 |
| abstract_inverted_index.asymmetric | 61, 100, 112 |
| abstract_inverted_index.designers. | 74 |
| abstract_inverted_index.presented, | 140 |
| abstract_inverted_index.protection | 6 |
| abstract_inverted_index.techniques | 53, 133 |
| abstract_inverted_index.Encryption, | 0 |
| abstract_inverted_index.illustrates | 118 |
| abstract_inverted_index.information | 9 |
| abstract_inverted_index.limitations | 120 |
| abstract_inverted_index.performance | 128 |
| abstract_inverted_index.undetected. | 26 |
| abstract_inverted_index.cryptography | 62, 101 |
| abstract_inverted_index.effectively. | 151 |
| abstract_inverted_index.comprehensive | 127 |
| abstract_inverted_index.cryptosystem. | 113 |
| abstract_inverted_index.re-randomized | 149 |
| abstract_inverted_index.Re-randomizing | 75 |
| abstract_inverted_index.re-randomization | 59, 103, 132 |
| abstract_inverted_index.Pailliar’s | 111 |
| abstract_inverted_index.re-randomization. | 55, 125 |
| abstract_inverted_index.indistinguishable. | 92 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 94 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.4699999988079071 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.55885363 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |