Search
Search Results
-
Game-based inoculation versus graphic-based inoculation to combat misinformation: a randomized controlled trial
Misinformation affects various aspects of people’s lives, such as politics, entertainment, and social interactions. However, effective intervention...
-
A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It...
-
Towards a Competitive Two-Player Anti-phishing Learning Game
This paper explores the design and implementation of a competitive two-player anti-phishing learning game on the topic of phishing emails, aiming to... -
Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
Authenticated key exchange (AKE) protocol is a security mechanism that ensures two parties communicate securely on a public channel and keeps the... -
Game Theoretical Adversarial Deep Learning
This chapter summarizes the game theoretical strategies for generating adversarial manipulations. The adversarial learning objective for our... -
The Judgment Game: The Turing Test as a General Research Framework
Turing’s three-participant “Imitation Game,” is revisited and the probabilistic and temporal nature of the game is formalized. It is argued that... -
An improved three-factor authentication and key agreement protocol for smart grid
Recently, a three-factor authentication scheme for smart grid environment was published by Wazid et al., with the claim that their scheme is secure...
-
Impostor GAN: Toward Modeling Social Media User Impersonation with Generative Adversarial Networks
The problem of “fake accounts” on social media has gained a lot of attention recently because of the role they play in generating/propagating... -
Asymmetric Centrality Game Against Network Epidemic Propagation
The Mirai botnet network epidemic discovered in 2016 falls into the category of numerous epidemics propagated by attackers over a network to gain... -
On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
The advent of the internet of things (IoT) in the global communication network has made everything interconnected and accessible. Therefore, the...
-
The Digital Survival Game to Enhance the Digital Quotient of Lower Secondary Students
This research aims to study the results of a digital game with a student-centered approach to enhance the digital quotient of lower secondary school... -
A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud
Abstract
With the increased number of smart devices in IoT and cloud, communication messages are exchanged extensively throughout the network. This...
-
Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy
Attackers use various techniques to lure victims to malicious domains. A typical approach is to generate domains which look similar to well-known... -
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare
Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare...
-
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication
The three party authenticated key agreement protocol assists two parties in affirming one another and agreeing on a shared session key with the...
-
A Robust Four-Factor Authentication Protocol for Resource Mining
Resource mining is the basic necessity for a country’s technological and economic development. Rare-earth elements reshape the economy of a country....
-
ESAF: An Enhanced and Secure Authenticated Framework for Wireless Sensor Networks
Wireless Sensor Network (WSN) is an application centred network which provide physical data from environment where it is positioned. WSNs are...
-
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...
-
Quantum-secure content key delivery mechanism for DRM system
As a result of the development of digital and internet technologies, digital content theft has become a major problem for the multimedia industry....
-