Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
man-in-the-middle attack
biblio
Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
Submitted by grigby1 on Mon, 02/10/2020 - 11:24am
privacy
website
SQL injection
SQL detection
Sniffing
Scalability
Resiliency
resilience
pubcrawl
Brute Force Attack
policy-based governance
Penetration Testing
Metrics
man-in-the-middle attack
Human behavior
cross-site scripting
Cross Site Scripting
collaboration
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
request message
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
message serial number
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
EAP-TLS authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
802.1X / EAP authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
biblio
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments
Submitted by grigby1 on Wed, 07/18/2018 - 10:24am
multi-factor
authentication
biometrics
Human behavior
human behaviour
human factor
Human Factors
man-in-the-middle attack
mobile cloud computing
wireless
networks
pubcrawl
security
Sniffing
SSO
Two Factor
two factor authentication
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
biblio
Security and privacy for smart grid using scalable key management
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
Public key
symmetric key technique
symmetric key scheme works
smart power grids
Smart Grids
Smart Grid
sensors
secure key management
Scalable Security
scalable key management
Scalability
replay attack
public key cryptography
authentication
pubcrawl
Protocols
power system security
power system management
Needham-Schroeder authentication protocol
Needham Schroder Authentication
man-in-the-middle attack
key management
Fault-Tolerance
fault tolerance
elliptic curve public key technique
Cryptographic Protocols
biblio
Group signature entanglement in e-voting system
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
group signature entanglement
security system
security of data
replay attack
Receivers
Qubit
Quantum entanglement
quantum computing
Protocols
politics
man-in-the-middle attack
authentication
Entanglement
entangled state
electronic voting
eavesdropping
e-voting system
digital signatures
database
cheating purposes
ballots
« first
‹ previous
1
2