We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,012 results
  1. Towards a Competitive Two-Player Anti-phishing Learning Game

    This paper explores the design and implementation of a competitive two-player anti-phishing learning game on the topic of phishing emails, aiming to...
    Rene Roepke, Johannes Ballmann in Games and Learning Alliance
    Conference paper 2024
  2. Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol

    Authenticated key exchange (AKE) protocol is a security mechanism that ensures two parties communicate securely on a public channel and keeps the...
    Conference paper 2022
  3. Game Theoretical Adversarial Deep Learning

    This chapter summarizes the game theoretical strategies for generating adversarial manipulations. The adversarial learning objective for our...
    Aneesh Sreevallabh Chivukula, **nghao Yang, ... Wanlei Zhou in Adversarial Machine Learning
    Chapter 2023
  4. Impostor GAN: Toward Modeling Social Media User Impersonation with Generative Adversarial Networks

    The problem of “fake accounts” on social media has gained a lot of attention recently because of the role they play in generating/propagating...
    Masnoon Nafees, Shimei Pan, ... James R. Foulds in Deceptive AI
    Conference paper 2021
  5. Asymmetric Centrality Game Against Network Epidemic Propagation

    The Mirai botnet network epidemic discovered in 2016 falls into the category of numerous epidemics propagated by attackers over a network to gain...
    Willie Kouam, Yezekael Hayel, ... Charles Kamhoua in Decision and Game Theory for Security
    Conference paper 2023
  6. A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

    Abstract

    With the increased number of smart devices in IoT and cloud, communication messages are exchanged extensively throughout the network. This...

    Anuj Kumar Singh, Anand Nayyar, Ankit Garg in Multimedia Tools and Applications
    Article 23 November 2022
  7. Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy

    Attackers use various techniques to lure victims to malicious domains. A typical approach is to generate domains which look similar to well-known...
    Florian Quinkert, Dennis Tatang, Thorsten Holz in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2021
  8. REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare

    Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare...

    Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari in The Journal of Supercomputing
    Article 22 November 2023
  9. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication

    The three party authenticated key agreement protocol assists two parties in affirming one another and agreeing on a shared session key with the...

    Uddeshaya Kumar, Manish Garg, Gautam Kaushik in Cluster Computing
    Article 08 January 2024
  10. Quantum-secure content key delivery mechanism for DRM system

    As a result of the development of digital and internet technologies, digital content theft has become a major problem for the multimedia industry....

    Purva Rewal, Komal Pursharthi, Dheerendra Mishra in Multimedia Tools and Applications
    Article 15 March 2024
  11. The Genius of the 'Original Imitation Game' Test

    Twenty years ago in "Turing's Two Tests for Intelligence" I distinguished two distinct tests to be found in Alan Turing's 1950 paper "Computing...

    S. G. Sterrett in Minds and Machines
    Article 29 October 2020
  12. A multi-layered security model to counter social engineering attacks: a learning-based approach

    Social engineering is a malicious technique that leverages deception and manipulation to exploit the cognitive biases and heuristics of human...

    Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan in International Cybersecurity Law Review
    Article 18 April 2024
  13. Chaotic map based multi-factor authentication protocol for underwater environment monitoring

    The underwater environment holds significant potential for advancing ecosystem understanding, industrial operations, and early natural disaster...

    Diksha Rangwani, Hari Om in Multimedia Tools and Applications
    Article 05 September 2023
  14. An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy

    Vehicle-to-Infrastructure (V2I) communication is the key requirement in various applications of Vehicular Ad-hoc Network (VANET). However, due to the...

    Pankaj Kumar, Hari Om in The Journal of Supercomputing
    Article 14 December 2022
  15. A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture

    The emerging cloud infrastructure has escalated number of servers offering flexible and diverse remote services through public channels. However,...

    Shivangi Shukla, Sankita J. Patel in Cluster Computing
    Article 29 May 2023
  16. Automated detection, categorisation and developers’ experience with the violations of honesty in mobile apps

    Human values such as honesty, social responsibility, fairness, privacy, and the like are things considered important by individuals and society....

    Humphrey O. Obie, Hung Du, ... Hourieh Khalajzadeh in Empirical Software Engineering
    Article Open access 27 September 2023
  17. A provably secure lightweight authentication protocol in mobile edge computing environments

    Mobile edge computing can meet the needs of users in real time by pushing cloud resources, such as computing, network, and storage, to the edge of a...

    Tsu-Yang Wu, Qian Meng, ... Saru Kumari in The Journal of Supercomputing
    Article 26 March 2022
  18. A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing

    The widespread adoption of cloud computing enables the end-users to leverage convenient sharing, unlimited storage and on-demand access to big data....

    Shivangi Shukla, Sankita J. Patel in Computing
    Article 15 January 2022
  19. Exploring Different Game Mechanics for Anti-phishing Learning Games

    Existing anti-phishing learning games rely on the same simple game mechanics that do not allow for detailed assessment of the players’ acquired...
    Rene Roepke, Vincent Drury, ... Ulrik Schroeder in Games and Learning Alliance
    Conference paper 2021
Did you find what you were looking for? Share feedback.