Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Password authentication
biblio
A Novel Password Secure Mechanism using Reformation based Optimized Honey Encryption and Decryption Technique
Submitted by grigby1 on Fri, 04/14/2023 - 3:09pm
Resistance
Reformation-based scheme
Password authentication
optimized honey encryption and decryption
Brutal force attack
passwords
codes
brute force attacks
Force
collaboration
control systems
Protocols
authentication
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
A New Three Party Authenticated Key Agreement Protocol Which Is Defiant towards Password Guessing Attack
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
Servers
Password authentication
Password Guessing Attacks
password related attacks
private key cryptography
protocol vulnerable
Protocols
pubcrawl
Scalability
password
side channel attacks
Smart card
smart cards
Tamper resistance
tampered resistance property
telecommunication security
transaction secret values
accurate guess
off-line password guessing attack
new three party authenticated key agreement protocol
Metrics
message authentication
lost smart card
key agreement protocol
insecure channel
Human Factors
Human behavior
encryption
Cryptographic Protocols
cryptographic key agreement protocol
common session secret key
Bio-Hash
authentication
biblio
Two-factor authentication framework for private cloud
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
frequently used solution
two factor authentication
Web authentication form
unique code
two-factor authentication framework
two-factor authentication
TOTP user
TOTP authentication forms
TOTP
TFA
simple user authentication
public cloud
private cloud solutions
private cloud
Password authentication
OpenStack cloud
security
cloud providers
banking Websites
authentication module
additional field
Human Factors
password
message authentication
authentication
social networking (online)
Mobile handsets
Google
pubcrawl
Software
authorisation
Cloud Computing
biblio
Language Dependent Challenge-Based Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 1:38pm
pubcrawl
Metrics
native language backgrounds
native language speakers
native Telugu speakers
natural language processing
nonnative impostor users
Password authentication
Pressing
message authentication
rhythm
Slovak words
Spanish words
typing behaviour
typing rhythm
unobtrusive method
word processing
Writing
foreign language
authorisation
challenge-based KD system
common English words
data analysis
Databases
English challenge-based system
feature extraction
FMR
authentication
Human behavior
Human Factors
keystroke analysis
keystroke dynamic system
language dependent challenge-based keystroke dynamics
language dependent words
Measurement
biblio
Password authentication using Keystroke Biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
password
user verification mechanism
user natural typing pattern
User behavior
typing pattern matching
Text recognition
Support vector machines
security
robust security technique
pubcrawl170115
pattern matching
password security
Password authentication
artificial neural network
neural nets
Monitoring
keystroke biometrics
Hardware
Europe
error rates
Error analysis
Classification algorithms
biometrics (access control)
authorisation
authentication
Artificial Neural Networks
biblio
Improved privacy-preserving authentication scheme for roaming service in mobile networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:07pm
Password authentication
user authentication
user anonymity
telecommunication security
symmetric-key techniques
smart cards
Smart card
security-related issues
security mechanism
roaming service
Roaming
Protocols
authentication
offline password guessing attacks
nontamper-resistant assumption
mobile users
mobile radio
mobile networks
mobile computing
Mobile communication
message authentication
improved privacy-preserving two-factor authentication scheme
Cryptography