Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insecure channel
biblio
A New Three Party Authenticated Key Agreement Protocol Which Is Defiant towards Password Guessing Attack
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
Servers
Password authentication
Password Guessing Attacks
password related attacks
private key cryptography
protocol vulnerable
Protocols
pubcrawl
Scalability
password
side channel attacks
Smart card
smart cards
Tamper resistance
tampered resistance property
telecommunication security
transaction secret values
accurate guess
off-line password guessing attack
new three party authenticated key agreement protocol
Metrics
message authentication
lost smart card
key agreement protocol
insecure channel
Human Factors
Human behavior
encryption
Cryptographic Protocols
cryptographic key agreement protocol
common session secret key
Bio-Hash
authentication
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 9:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
Submitted by grigby1 on Fri, 02/08/2019 - 3:21pm
image encryption
symmetric encryption scheme
statistical attack
serpent-elliptic hybrid cryptosystem
Serpent algorithm
SERPENT
Resiliency
resilience
public key cryptography
pubcrawl
Multimedia systems
multimedia protection
Metrics
insecure networks
insecure channel
information security
Asymmetric Encryption
hybrid cryptosystem
Human behavior
encryption quality
encryption
Elliptic curves
Elliptic curve cryptography
differential attack
data encapsulation scheme
data encapsulation
Correlation
Compositionality
composability
asymmetric schemes key distribution
asymmetric encryption scheme
biblio
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
message authentication
Yung-Cheng-Lee's protocol
verification table
user impersonation attack
smart cards
Smart card
session key
Servers
server impersonation attack
remote user authentication protocol
Protocols
password change phase
authentication
legitimacy verification
insider attacks
insecure channel
dynamic id
denial-of-service attack
Cryptography
Cryptographic Protocols
cryptanalysis
computer network security
Bismuth