We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 2,481 results
  1. Game-based inoculation versus graphic-based inoculation to combat misinformation: a randomized controlled trial

    Misinformation affects various aspects of people’s lives, such as politics, entertainment, and social interactions. However, effective intervention...

    Bo Hu, **ng-Da Ju, ... Chang Lu in Cognitive Research: Principles and Implications
    Article Open access 31 July 2023
  2. A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities

    The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It...

    Komal Singh Gill, Anju Sharma, Sharad Saxena in Archives of Computational Methods in Engineering
    Article 01 April 2024
  3. Towards a Competitive Two-Player Anti-phishing Learning Game

    This paper explores the design and implementation of a competitive two-player anti-phishing learning game on the topic of phishing emails, aiming to...
    Rene Roepke, Johannes Ballmann in Games and Learning Alliance
    Conference paper 2024
  4. Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol

    Authenticated key exchange (AKE) protocol is a security mechanism that ensures two parties communicate securely on a public channel and keeps the...
    Conference paper 2022
  5. Game Theoretical Adversarial Deep Learning

    This chapter summarizes the game theoretical strategies for generating adversarial manipulations. The adversarial learning objective for our...
    Aneesh Sreevallabh Chivukula, **nghao Yang, ... Wanlei Zhou in Adversarial Machine Learning
    Chapter 2023
  6. The Judgment Game: The Turing Test as a General Research Framework

    Turing’s three-participant “Imitation Game,” is revisited and the probabilistic and temporal nature of the game is formalized. It is argued that...
    Chapter 2023
  7. An improved three-factor authentication and key agreement protocol for smart grid

    Recently, a three-factor authentication scheme for smart grid environment was published by Wazid et al., with the claim that their scheme is secure...

    Article 20 May 2022
  8. Impostor GAN: Toward Modeling Social Media User Impersonation with Generative Adversarial Networks

    The problem of “fake accounts” on social media has gained a lot of attention recently because of the role they play in generating/propagating...
    Masnoon Nafees, Shimei Pan, ... James R. Foulds in Deceptive AI
    Conference paper 2021
  9. Asymmetric Centrality Game Against Network Epidemic Propagation

    The Mirai botnet network epidemic discovered in 2016 falls into the category of numerous epidemics propagated by attackers over a network to gain...
    Willie Kouam, Yezekael Hayel, ... Charles Kamhoua in Decision and Game Theory for Security
    Conference paper 2023
  10. On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

    The advent of the internet of things (IoT) in the global communication network has made everything interconnected and accessible. Therefore, the...

    Sumbal Fatima, Muhammad Arslan Akram, ... Chien-Ming Chen in Wireless Personal Communications
    Article 01 May 2024
  11. The Digital Survival Game to Enhance the Digital Quotient of Lower Secondary Students

    This research aims to study the results of a digital game with a student-centered approach to enhance the digital quotient of lower secondary school...
    Conference paper 2023
  12. A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

    Abstract

    With the increased number of smart devices in IoT and cloud, communication messages are exchanged extensively throughout the network. This...

    Anuj Kumar Singh, Anand Nayyar, Ankit Garg in Multimedia Tools and Applications
    Article 23 November 2022
  13. Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy

    Attackers use various techniques to lure victims to malicious domains. A typical approach is to generate domains which look similar to well-known...
    Florian Quinkert, Dennis Tatang, Thorsten Holz in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2021
  14. REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare

    Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare...

    Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari in The Journal of Supercomputing
    Article 22 November 2023
  15. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication

    The three party authenticated key agreement protocol assists two parties in affirming one another and agreeing on a shared session key with the...

    Uddeshaya Kumar, Manish Garg, Gautam Kaushik in Cluster Computing
    Article 08 January 2024
  16. A Robust Four-Factor Authentication Protocol for Resource Mining

    Resource mining is the basic necessity for a country’s technological and economic development. Rare-earth elements reshape the economy of a country....

    Diksha Rangwani, Hari Om in Arabian Journal for Science and Engineering
    Article 23 July 2022
  17. ESAF: An Enhanced and Secure Authenticated Framework for Wireless Sensor Networks

    Wireless Sensor Network (WSN) is an application centred network which provide physical data from environment where it is positioned. WSNs are...

    Shanil Sharma, Saurabh Rana, Sudhanshu Shekhar Dubey in Wireless Personal Communications
    Article 26 June 2024
  18. A lightweight and anonymous mutual authentication and key agreement scheme for WBAN

    In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...

    Saba Marandi, Farokhlagha Moazami, Amir Malekinezhad in Peer-to-Peer Networking and Applications
    Article 23 May 2024
  19. Quantum-secure content key delivery mechanism for DRM system

    As a result of the development of digital and internet technologies, digital content theft has become a major problem for the multimedia industry....

    Purva Rewal, Komal Pursharthi, Dheerendra Mishra in Multimedia Tools and Applications
    Article 15 March 2024
Did you find what you were looking for? Share feedback.