Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
brute force attacks
biblio
Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain- Texts
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
common-key cryptographic communication
brute force attacks
Software algorithms
security improvement
legal plaintext
fundamental methods
fake plaintexts
fake plain-texts
decryption keys
cryptogram
concrete encryption-decryption algorithm
common-key cryptosystem
encryption
Common Key Cryptosystem
Brute Force Attack
policy-based governance
Human Factors
Computers
Law
eavesdropper
collaboration
pubcrawl
public key cryptography
telecommunication security
biblio
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
fault tolerant key generation
brute force attacks
Wireless communications
spread spectrum communication
sensor networks
Security parameters
secure spread spectrum communication
Secure Spread Spectrum
mobile ad hoc networks
mobile ad hoc network
level message security
level encryption securities
key generation
group key generation algorithms
Fault tolerant systems
Cryptography
complex Random key generation algorithms
client side encryption
attacks
fault tolerance
Brute Force Attack
AES
policy-based governance
Human Factors
Force
collaboration
pubcrawl
telecommunication security
Wireless communication
Servers
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
Engines
brute force attacks
SQL-like syntax
SQL
network flows
network attacks
multistage HTTP brute force attack detection
flow-based detection methods
Event Processing Language
ESPER
EPL
detection method
complex event processing
CEP
security
policy-based governance
transport protocols
Human Factors
Databases
Uniform resource locators
Force
collaboration
pubcrawl
network security
Monitoring
IP networks
computer network security
biblio
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
policy-based governance
brute force attacks
plaintext
key space
information theory
cryptosystem key
cryptographer
Crypto-System
Brute Force Attack
game theory
Ciphers
Ciphertext
Human Factors
Games
collaboration
pubcrawl
Security Evaluation
Mathematical model
Cryptography
biblio
A Novel Logical Locking Technique Against Key-Guessing Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Observability
intellectual property piracy
ISCAS'85 benchmark circuits
key guessing attacks
Key-gates
key-guessing attacks
logical locking
logical locking technique
logically locked design
intellectual property
path sensitization attacks
Secret key
secured hardware
secured locking mechanism
system analysis and design
Testability measures
Trojan insertion
brute force attacks
integrated circuits
Hardware
private key cryptography
Hamming distance
pubcrawl
collaboration
Computer crime
Human Factors
policy-based governance
invasive software
added logics
Brute Force Attack
embedded computing
hardware attacks
hill climbing attack
illegal integrated circuit overproduction
industrial property
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Brute-force and dictionary attack on hashed real-world passwords
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
educational administrative data processing
brute force attacks
uncracked passwords
Slovenian university
password security
password creation policies
password cracking
online grading system
hybrid attacks
hashed real-world passwords
hashed passwords
Educational institutions
authorisation
Dictionaries
cracked passwords
Brute-force Attack
dictionary attack
information system
policy-based governance
Human Factors
password
Force
collaboration
pubcrawl
biblio
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
IPv6 DNS reconnaissance attacks
Servers
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
Network reconnaissance
naive brute forcing approach
IPv6 reconnaissance techniques
IPv6 network reconnaissance
brute force attacks
IPv6 addresses
IPv6
IPv4 address space
IP networks
internet
IDS
DNS Guard
DNS
computer network security
Computer crime
address scanning attacks
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
« first
‹ previous
1
2
3
4
5
next ›
last »