Journal articles on the topic 'Dictionary Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Dictionary Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kapoor, Pranav, Pratham Agrawal, and Aju D. "ANALYZING PASSWORD DECRYPTION TECHNIQUES USING DICTIONARY ATTACK." International Journal of Advanced Research 9, no. 08 (August 31, 2021): 515–23. http://dx.doi.org/10.21474/ijar01/13299.
Full textDagelić, Ante, Toni Perković, Bojan Vujatović, and Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists." Wireless Communications and Mobile Computing 2018 (July 22, 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.
Full textNam, Junghyun, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won. "Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/802359.
Full textLasc, Ioana, Reiner Dojen, and Tom Coffey. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 33–49. http://dx.doi.org/10.4018/jisp.2011010103.
Full textChakrabarti, Saikat, and Mukesh Singhal. "Password-Based Authentication: Preventing Dictionary Attacks." Computer 40, no. 6 (June 2007): 68–74. http://dx.doi.org/10.1109/mc.2007.216.
Full textTajari Siahmarzkooh, A., J. Karimpour, and S. Lotfi. "A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks." Engineering, Technology & Applied Science Research 6, no. 6 (December 18, 2016): 1227–34. http://dx.doi.org/10.48084/etasr.937.
Full textWang, Chenyu, and Guoai Xu. "Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1619741.
Full textLiu, Hui. "An Improvement Password-Based Authentication Protocol Using Smart Card." Applied Mechanics and Materials 303-306 (February 2013): 2182–85. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2182.
Full textSekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (June 1, 2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.
Full textWang, Chenyu, Guoai Xu, and Wenting Li. "A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment." Security and Communication Networks 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/9062675.
Full textNAMPREMPRE, C., and M. N. DAILEY. "Mitigating Dictionary Attacks with Text-Graphics Character CAPTCHAs." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (January 1, 2007): 179–86. http://dx.doi.org/10.1093/ietfec/e90-a.1.179.
Full textGoyal, Vipul, Virendra Kumar, Mayank Singh, Ajith Abraham, and Sugata Sanyal. "A new protocol to counter online dictionary attacks." Computers & Security 25, no. 2 (March 2006): 114–20. http://dx.doi.org/10.1016/j.cose.2005.09.003.
Full textAsaad, Renas R. "Penetration Testing: Wireless Network Attacks Method on Kali Linux OS." Academic Journal of Nawroz University 10, no. 1 (February 4, 2021): 7. http://dx.doi.org/10.25007/ajnu.v10n1a998.
Full textLai, Hong, Jinghua Xiao, Lixiang Li, and Yixian Yang. "Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol." Mathematical Problems in Engineering 2012 (2012): 1–17. http://dx.doi.org/10.1155/2012/454823.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (June 29, 2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textYeh, Kuo-Hui, N. W. Lo, Tien-Ruey Hsiang, Yi-Chun Wei, and Hung-Yi Hsieh. "Chaos Between Password-Based Authentication Protocol and Dictionary Attacks." Advanced Science Letters 19, no. 3 (March 1, 2013): 1048–51. http://dx.doi.org/10.1166/asl.2013.4864.
Full textCorin, Ricardo, Jeroen Doumen, and Sandro Etalle. "Analysing Password Protocol Security Against Off-line Dictionary Attacks." Electronic Notes in Theoretical Computer Science 121 (February 2005): 47–63. http://dx.doi.org/10.1016/j.entcs.2004.10.007.
Full textKohlios, Christopher, and Thaier Hayajneh. "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3." Electronics 7, no. 11 (October 30, 2018): 284. http://dx.doi.org/10.3390/electronics7110284.
Full textZhang, Li Hua, Li Ping Zhang, and Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme." Advanced Materials Research 108-111 (May 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Full textSchweitzer, Dino, Jeff Boleng, Colin Hughes, and Louis Murphy. "Visualizing Keyboard Pattern Passwords." Information Visualization 10, no. 2 (November 18, 2010): 127–33. http://dx.doi.org/10.1057/ivs.2010.12.
Full textNam, Junghyun, Kim-Kwang Raymond Choo, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim, Juryon Paik, and Dongho Won. "Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/825072.
Full textXu, Meijia, Qiying Dong, Mai Zhou, Chenyu Wang, and Yangyang Liu. "Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–4. http://dx.doi.org/10.1155/2020/8838363.
Full textL.P.Ramyasri, P., D. Malathi, J. D. Dorathi Jayaseeli, and K. Senthilkumar. "Study and Development of Graphical Authentication System for Secure File Transmission." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 470. http://dx.doi.org/10.14419/ijet.v7i4.10.21042.
Full textSelvi, P. Tamil, and N. Radha. "Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks." International Journal of Computer Applications 11, no. 11 (December 10, 2010): 7–12. http://dx.doi.org/10.5120/1629-2190.
Full textKumar, A. "Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionary attacks." IOSR Journal of Computer Engineering 12, no. 3 (2013): 20–24. http://dx.doi.org/10.9790/0661-1232024.
Full textSatoh, Akihiro, Yutaka Nakamura, and Takeshi Ikenaga. "A flow-based detection method for stealthy dictionary attacks against Secure Shell." Journal of Information Security and Applications 21 (April 2015): 31–41. http://dx.doi.org/10.1016/j.jisa.2014.08.003.
Full textNarasimha, C., and M. Sreedevi. "Secured authentication using CAPTCHA and visualized passcode." International Journal of Engineering & Technology 7, no. 1.8 (February 9, 2018): 72. http://dx.doi.org/10.14419/ijet.v7i1.8.9973.
Full textCurran, Kevin, and Andrew Snodgrass. "A Novel Cue based Picture Word Shape Character Password Creation Scheme." International Journal of Digital Crime and Forensics 7, no. 3 (July 2015): 37–59. http://dx.doi.org/10.4018/ijdcf.2015070103.
Full textVan Oorschot, Paul C., and Stuart Stubblebine. "On countering online dictionary attacks with login histories and humans-in-the-loop." ACM Transactions on Information and System Security 9, no. 3 (August 2006): 235–58. http://dx.doi.org/10.1145/1178618.1178619.
Full textJournal, Baghdad Science. "Evaluating Windows Vista user account security." Baghdad Science Journal 8, no. 2 (June 5, 2011): 419–28. http://dx.doi.org/10.21123/bsj.8.2.419-428.
Full textChoi, Jun-Ho, Chang Choi, Byeong-Kyu Ko, and Pan-Koo Kim. "Detection of Cross Site Scripting Attack in Wireless Networks Using n-Gram and SVM." Mobile Information Systems 8, no. 3 (2012): 275–86. http://dx.doi.org/10.1155/2012/605495.
Full textRodwald, Przemysław. "Choosing a password breaking strategy with imposed time restrictions." Bulletin of the Military University of Technology 68, no. 1 (March 29, 2019): 79–100. http://dx.doi.org/10.5604/01.3001.0013.1467.
Full textMusliyana, Zuhar, Teuku Yuliar Arif, and Rizal Munadi. "Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia." Jurnal Rekayasa Elektrika 12, no. 1 (March 25, 2016): 21. http://dx.doi.org/10.17529/jre.v12i1.2896.
Full textYang, Chao, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, and Jianfeng Ma. "Fingerprint Protected Password Authentication Protocol." Security and Communication Networks 2019 (June 26, 2019): 1–12. http://dx.doi.org/10.1155/2019/1694702.
Full textSri Ram Varma, D., K. Meghana, V. Sai Deepak, and R. Murugan. "Graphical password scheme to diminish shoulder surfing." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 234. http://dx.doi.org/10.14419/ijet.v7i1.1.9474.
Full textDelaune, Stéphanie, and Florent Jacquemard. "Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks." Journal of Automated Reasoning 36, no. 1-2 (July 20, 2006): 85–124. http://dx.doi.org/10.1007/s10817-005-9017-7.
Full textPuthuparambil, Arun Babu, and Jithin Jose Thomas. "Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks." Journal of Information Security and Applications 49 (December 2019): 102396. http://dx.doi.org/10.1016/j.jisa.2019.102396.
Full textYoun, Taek-Young, Nam-Su Jho, Keonwoo Kim, Ku-Young Chang, and Ki-Woong Park. "Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms." Energies 13, no. 11 (May 29, 2020): 2742. http://dx.doi.org/10.3390/en13112742.
Full textSelvaraj, Divya, and Padmavathi Ganapathi. "Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression." Journal of Computer Networks and Communications 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/206867.
Full text., Pankhuri, Akash Sinha, Gulshan Shrivastava, and Prabhat Kumar. "A Pattern-Based Multi-Factor Authentication System." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 101–12. http://dx.doi.org/10.12694/scpe.v20i1.1460.
Full textMülazimoğlu, Emre, Murat P. Çakır, and Cengiz Acartürk. "The Role of Visual Features in Text-Based CAPTCHAs: An fNIRS Study for Usable Security." Computational Intelligence and Neuroscience 2021 (May 4, 2021): 1–24. http://dx.doi.org/10.1155/2021/8842420.
Full textWang, Chenyu, Ke Ding, Bin Li, Yiming Zhao, Guoai Xu, Yanhui Guo, and Ping Wang. "An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment." Wireless Communications and Mobile Computing 2018 (October 1, 2018): 1–13. http://dx.doi.org/10.1155/2018/3048697.
Full textKamboj, Minakshi, and Sanjeev Rana. "Toward Improving Secret Sharing Scheme Based on Encryption in Cloud Computing Environment." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2669–73. http://dx.doi.org/10.1166/jctn.2020.8964.
Full textBallesteros, Juan. "SEGURIDAD EN REDES INALÁMBRICAS DE ACCESO LOCAL BAJO PARÁMETROS DE USO DE HERRAMIENTAS LIBRES." Revista Cientifica TECNIA 26, no. 1 (November 28, 2016): 57. http://dx.doi.org/10.21754/tecnia-26012016.06.
Full textBallesteros, Juan, and Fabián Chaparro. "SEGURIDAD EN REDES INALÁMBRICAS DE ACCESO LOCAL BAJO PARÁMETROS DE USO DE HERRAMIENTAS LIBRES." Revista Cientifica TECNIA 26, no. 1 (November 28, 2016): 57. http://dx.doi.org/10.21754/tecnia.v26i1.7.
Full textHamid, S., N. Z. Bawany, and S. Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (October 9, 2019): 4808–12. http://dx.doi.org/10.48084/etasr.3060.
Full textWise, Robert A., Julie A. Anderson, Pierre Amarenco, Nicholas J. Cowans, Courtney Crim, Martin A. Denvir, Camilo R. Gomez, et al. "Adjudication of cardiovascular events in patients with chronic obstructive pulmonary disease: SUMMIT trial." Clinical Trials 17, no. 4 (May 22, 2020): 430–36. http://dx.doi.org/10.1177/1740774520920897.
Full textBouzelat, H., F. A. Allaert, A. M. Benhamiche, J. Faivre, L. Dusserre, and C. Quantin. "Automatic Record Hash Coding and Linkage for Epidemiological Follow-up Data Confidentiality." Methods of Information in Medicine 37, no. 03 (July 1998): 271–77. http://dx.doi.org/10.1055/s-0038-1634527.
Full textVivek Tammineedi, Venkata Satya, and V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Full textPigliucci, Massimo. "Fundamentalism and science." Journal of Science Communication 05, no. 02 (June 21, 2006): C06. http://dx.doi.org/10.22323/2.05020306.
Full text