Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Brute Force Attack
biblio
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
policy-based governance
brute force attacks
plaintext
key space
information theory
cryptosystem key
cryptographer
Crypto-System
Brute Force Attack
game theory
Ciphers
Ciphertext
Human Factors
Games
collaboration
pubcrawl
Security Evaluation
Mathematical model
Cryptography
biblio
A Novel Logical Locking Technique Against Key-Guessing Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Observability
intellectual property piracy
ISCAS'85 benchmark circuits
key guessing attacks
Key-gates
key-guessing attacks
logical locking
logical locking technique
logically locked design
intellectual property
path sensitization attacks
Secret key
secured hardware
secured locking mechanism
system analysis and design
Testability measures
Trojan insertion
brute force attacks
integrated circuits
Hardware
private key cryptography
Hamming distance
pubcrawl
collaboration
Computer crime
Human Factors
policy-based governance
invasive software
added logics
Brute Force Attack
embedded computing
hardware attacks
hill climbing attack
illegal integrated circuit overproduction
industrial property
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
Submitted by grigby1 on Mon, 02/10/2020 - 11:24am
privacy
website
SQL injection
SQL detection
Sniffing
Scalability
Resiliency
resilience
pubcrawl
Brute Force Attack
policy-based governance
Penetration Testing
Metrics
man-in-the-middle attack
Human behavior
cross-site scripting
Cross Site Scripting
collaboration
« first
‹ previous
1
2