Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Brute Force Attack
biblio
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 12:53pm
Hash functions
password security
Message Digest (MD)
collision attack
Brute Force Attack
passwords
Spraying
Secure Hash Algorithm (SHA)
hash algorithms
Computer hacking
Force
Compositionality
Companies
Databases
Resiliency
resilience
pubcrawl
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 3:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
Behaviour Analysis of Open-Source Firewalls Under Security Crisis
Submitted by grigby1 on Fri, 01/13/2023 - 11:50am
Flooding
Ping of death
pfSense
OPNSense
Open-source Firewalls
Nmap
Medusa
HYDRA
hping3
Firewall performance
Brute Force Attack
Security by Default
signal processing
Force
Firewalls (computing)
Virtual private networks
Floods
Wireless communication
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Distributed Transform Encoder to Improve Diffie-Hellman Protocol for Big Message Security
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
Human behavior
security
Public key
pubcrawl
Protocols
policy-based governance
Main in the Middle Attack
Long Messages Encryption
Human Factors
Brute Force Attack
Hash functions
Force
encryption
distribution transforming encoder
Diffie-Hellman protocol
Cryptography
brute force attacks
biblio
High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC
Submitted by grigby1 on Tue, 03/09/2021 - 1:37pm
Human behavior
simulation
security
reverse engineering
pubcrawl
policy-based governance
Logic gates
Intellectual Property (IP) Protection
integrated circuits
Human Factors
intellectual property security
High Efficiency
Force
Camouflage Integrated Circuit (IC)
brute force attacks
Brute Force Attack
Benchmark testing
Resiliency
composability
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 12:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
Strong Password Generation Based On User Inputs
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
popular online password checkers
generated passwords
intricate password patterns
non crackable passwords
password authentication system
password cracking
password cracking attacks
Password entropy
Password generator
existing random password generators
produced passwords
Randomization technique
special characters
Strength checkers
strong password generation
Strong password pattern
brute force attacks
Brute Force Attack
data privacy
internet
message authentication
pubcrawl
Human Factors
policy-based governance
password security
user interfaces
authorisation
authentication systems
authenticity
Auto-generated
Case sensitive words
Combination of numbers
dictionary attack
electronic commerce
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain- Texts
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
common-key cryptographic communication
brute force attacks
Software algorithms
security improvement
legal plaintext
fundamental methods
fake plaintexts
fake plain-texts
decryption keys
cryptogram
concrete encryption-decryption algorithm
common-key cryptosystem
encryption
Common Key Cryptosystem
Brute Force Attack
policy-based governance
Human Factors
Computers
Law
eavesdropper
collaboration
pubcrawl
public key cryptography
telecommunication security
biblio
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
fault tolerant key generation
brute force attacks
Wireless communications
spread spectrum communication
sensor networks
Security parameters
secure spread spectrum communication
Secure Spread Spectrum
mobile ad hoc networks
mobile ad hoc network
level message security
level encryption securities
key generation
group key generation algorithms
Fault tolerant systems
Cryptography
complex Random key generation algorithms
client side encryption
attacks
fault tolerance
Brute Force Attack
AES
policy-based governance
Human Factors
Force
collaboration
pubcrawl
telecommunication security
Wireless communication
Servers
1
2
next ›
last »