Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 10:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
Authentication Model using the Bundled CAPTCHA OTP Instead of Traditional Password
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
Electronic mail
CAPTCHA
unique random parameter
traditional password
one time password
identity verification
e-mail
captchas
CAPTCHA OTP
Bundled CAPTCHA OTP
authentication model
authorisation
password
composability
Computational modeling
authentication
telecommunication security
message authentication
Human behavior
pubcrawl
Servers
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
full black-box security
user private key
user privacy security
user identity
user decryption
underlying TB-IBE scheme
token-based identity-based encryption
Resiliency
resilience
pubcrawl
private key cryptography
Metrics
malicious private key generator
Identity-based encryption
generic construction
A-IBE scheme
encryption
dummy identity-based encryption
Decoding
decoder box
data privacy
computational complexity
composability
ciphertexts
black-box security
black box encryption
authority identity-based encryption
authorisation
attribute-based encryption
Accountable authority
biblio
Strong Password Generation Based On User Inputs
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
popular online password checkers
generated passwords
intricate password patterns
non crackable passwords
password authentication system
password cracking
password cracking attacks
Password entropy
Password generator
existing random password generators
produced passwords
Randomization technique
special characters
Strength checkers
strong password generation
Strong password pattern
brute force attacks
Brute Force Attack
data privacy
internet
message authentication
pubcrawl
Human Factors
policy-based governance
password security
user interfaces
authorisation
authentication systems
authenticity
Auto-generated
Case sensitive words
Combination of numbers
dictionary attack
electronic commerce
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
Dictionaries
brute force attacks
shoulder surfing
password based authentication mechanism
password attacks
matrix based secure authentication mechanism
Matrix based authentication
key stroke technique
graphichical password technique
dictionary attacks
click pattern technique
Brute forcing
Cryptography
Resists
matrix algebra
policy-based governance
Human Factors
password
Force
pubcrawl
authentication
Indexes
authorisation
biblio
Analysis of GPGPU-Based Brute-Force and Dictionary Attack on SHA-1 Password Hash
Submitted by grigby1 on Fri, 09/04/2020 - 2:36pm
general-purpose computing on graphics processing unit
brute force attacks
word-list
SHA-1 password hash
SHA-1
secure hash algorithm
password hash
mask-attack
hashed password data
GPGPU-based cracking
GPGPU-based brute-force attack
Cryptography
dictionary attack
brute-force
authentication data
policy-based governance
Human Factors
pubcrawl
encrypted file
message authentication
file organisation
authorisation
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Brute-force and dictionary attack on hashed real-world passwords
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
educational administrative data processing
brute force attacks
uncracked passwords
Slovenian university
password security
password creation policies
password cracking
online grading system
hybrid attacks
hashed real-world passwords
hashed passwords
Educational institutions
authorisation
Dictionaries
cracked passwords
Brute-force Attack
dictionary attack
information system
policy-based governance
Human Factors
password
Force
collaboration
pubcrawl
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »