Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
password
biblio
Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
32/34/26-instance parallelization
brute force attacks
single Virtex-7 FPGA device
pre-image brute-force attack
pipeline processing
MD5 hash generation
MD5 hash algorithm
LUT
IP core
HDL
Hardware design languages
guess password generation
Cryptography
field programmable gate arrays
gpu
policy-based governance
Human Factors
password
pubcrawl
Generators
Hardware
computer architecture
Hardware Implementation
biblio
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute—Force Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
Vectors
brute force attacks
universal randomized guessing
universal distribution
universal decentralized guessing strategies
source coding
memoryless systems
guesswork moment
asynchronous decentralized brute - force attacks
Brute-force Attack
botnet
query processing
policy-based governance
Entropy
Human Factors
Random variables
password
Decoding
pubcrawl
tools
invasive software
computer network security
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Brute-force and dictionary attack on hashed real-world passwords
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
educational administrative data processing
brute force attacks
uncracked passwords
Slovenian university
password security
password creation policies
password cracking
online grading system
hybrid attacks
hashed real-world passwords
hashed passwords
Educational institutions
authorisation
Dictionaries
cracked passwords
Brute-force Attack
dictionary attack
information system
policy-based governance
Human Factors
password
Force
collaboration
pubcrawl
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 1:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
Enhanced Secure Hash Algorithm-512 based on Quadratic Function
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
hash outputs
Urban areas
SHA-1
Resiliency
resilience
Registers
quadratic function
pubcrawl
primitive function
password
mobile ad hoc networks
avalanche effect
hash message
Hash functions
hash collisions
hash collision
hash algorithms
extended bits
enhanced SHA-1 algorithm
enhanced secure hash algorithm-512
Cryptography
Compositionality
biblio
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
Submitted by aekwall on Mon, 06/08/2020 - 10:32am
hash collisions
hash algorithms
web portal
SHA-1
secured web portal
salt generation
salt algorithm
password hashing
matrix encryption key
Internet security
hash tables
hash message
Hash Function
Cryptography
enhanced secure hash algorithm-512
file organisation
Hash functions
Compositionality
Portals
Ciphers
password
web applications
Databases
pubcrawl
Resiliency
encryption
biblio
Authenticate Users with Their Work on the Internet
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
message authentication
Web pages
user authentication
secret password
Resiliency
resilience
remote information systems
remote access
pubcrawl
password
multifactor authentication
Metrics
authentication
Internet user
internet
Human Factors
Human behavior
History
Document Object Model
classification of text documents
Browsers
authorization
authorisation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »