Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
password
biblio
A New Initial Authentication Scheme for Kerberos 5 Based on Biometric Data and Virtual Password
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
Metrics
virtual password
Three Party Protocol
Symmetric cryptocraphy
strong authentication scenario
Servers
secure session
Resiliency
pubcrawl
Protocols
password-guessing attack
password-based scheme
password
authentication
Kerberos
initial authentication scheme
Human behavior
Fingerprint recognition
data privacy
Cryptography
Cryptographic Protocols
biometrics (access control)
biometric data
bioinformatics
authentication protocol
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
request message
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
message serial number
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
EAP-TLS authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
802.1X / EAP authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
biblio
Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
password
tools
text-based authentication mechanisms
situational awareness
Resiliency
resilience
pubcrawl
password security policies
password cracking tools
password cracking
password auditing tools
password auditing policy
password auditing
auditing results
Organizations
next-generation password auditing toolkits
Metrics
Guidelines
Force
Dictionaries
cyber situational awareness
cyber security
cyber defence toolkits
composability
authorisation
biblio
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System
Submitted by aekwall on Mon, 03/18/2019 - 8:49am
Software Guard Extensions
PAM authentication framework
password
password file protection scheme
private memory regions
privileged code
sensitive applications
SGX enclave
Software Architecture
OS kernel
TCB
trusted computing base
UniSGX
Unix
Unix systems
untrusted operating system
BIOS Security
Human behavior
Scalability
authorisation
encryption
telecommunication security
Hardware
Program processors
Trusted Computing
Resiliency
security of data
pubcrawl
Metrics
authentication
Intel SGX
authentication credentials
BIOS
computational security
biblio
Email-Based Password Recovery - Risking or Rescuing Users?
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
resilience
Web sites
web services
user instructions
user authentication
usability
Unsolicited electronic mail
telecommunication security
System recovery
shared secret
security problem
secret passwords
secret link
Resiliency
authentication
pubcrawl
password recovery email
password recovery
password
message authentication
entire user-website relationship
English language websites
email-based password recovery
email content
Electronic mail
content issues
content and design of email-based password recovery
authorisation
biblio
Honeypot in the Cloud Five Years of Data Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:37pm
Honeypott
tools
security of data
Scalability
Resiliency
resilience
Ransomware
pubcrawl
password
Human Factors
Human behavior
Computer crime
Honeypot Results
Honeypot in the cloud
honeypot data
Honeypot Analysis
honeypot
honey pots
data analysis
cyber security
Computer hacking
biblio
Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication
Submitted by grigby1 on Fri, 02/08/2019 - 3:34pm
authentication
Human behavior
Human Factors
LinkedIn
password
PRMitM
pubcrawl
Registers
two factor authentication
two-factor authentication
Uniform resource locators
biblio
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
Submitted by grigby1 on Fri, 02/08/2019 - 3:34pm
password
zero-effort two-factor authentication
zero-effort 2FA mechanism
user-friendliness
user experience
two factor authentication
time synchronization
Support vector machines
support vector machine
SoundAuth
smart phones
smart phone
Servers
pubcrawl
ambient audio signals
online front-ends
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
co-presence detection
challenge-response protocol
Browsers
browser
authorisation
authentication
audio signals
ambient sound
biblio
A Multi-Layered Approach to Securing Enterprise Applications by Using TLS, Two-Factor Authentication and Single Sign-On
Submitted by grigby1 on Fri, 02/08/2019 - 3:34pm
Mobile Internet applications
two-factor authentication
two factor authentication
single sign-on capability
single sign-on authentication
Security Token
security requirements
security of data
security
pubcrawl
password
OTP mechanism
one-time passwords
One-Time Password (OTP)
MultiLayered Framework
multilayered approach
application data
mobile computing
IP networks
Internet attackers
internet
Information Security concept
information protection
information and communication technology
Human Factors
Human behavior
enterprise applications
Dogs
Computer crime
authentication application
authentication
biblio
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 3:34pm
JWT
user authentication codes
two-factor authentication method
two-factor authentication
two factor authentication
TOTP-based two factor authentication scheme
TOTP
Servers
pubcrawl
private blockchain
Payloads
password
OTP tokens
membership service
JWT authentication method
additional time-based password
Hyperledger Fabric v1.0
Hyperledger Fabric v
hyperledger fabric blockchain
Hyperledger Fabric
Human Factors
Human behavior
Fabrics
Cryptography
Claim Token method
authorisation
authentication vulnerability
authentication servers
authentication
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »