نتایج جستجو برای: avoidanceanxiety insecure

تعداد نتایج: 4640  

Journal: :CoRR 2018
Lachlan Urquhart Derek McAuley

Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Inform...

Journal: :J. Comput. Syst. Sci. 2006
I-En Liao Cheng-Chi Lee Min-Shiang Hwang

Authentication ensures that system’s resources are not obtained fraudulently by illegal users. Password authentication is one of the simplest and the most convenient authentication mechanisms over insecure networks. The problem of password authentication in an insecure networks is present in many application areas. Since computing resources have grown tremendously, password authentication is mo...

Journal: :Policy brief 2012
M Pia Chaparro Brent Langellier Kerry Birnbach Matthew Sharp Gail Harrison

Food insecurity has increased significantly among low-income Californians over the last decade. According to data from the 2009 California Health Interview Survey, 3.8 million adults in households with incomes at or below 200% of the Federal Poverty Level (FPL) could not afford enough food at least once in the previous year. Low-income households with children and Spanish-speaking households su...

Journal: :Computer Communications 2006
Mohammad Peyravian Clark Jeffries

Remote user authentication based on passwords over untrusted networks is the conventional method of authentication in the Internet and mobile communication environment. Typical secure remote user access solutions rely on pre-established secure cryptographic keys, publickey infrastructure, or secure hardware. In this paper, we present secure password-based protocols for remote user authenticatio...

Journal: : 2023

Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs important tools for ensuring the security of network data and resources. The Internet Things (IoT) is an expanding intelligent machines sensors. However, they vulnerable to attackers because ubiquitous extensive IoT networks. Datasets from intrusion (IDS) have been analyzed deep methods such as Bidirection...

Journal: :IACR Cryptology ePrint Archive 2004
Fuw-Yi Yang Jinn-ke Jan Woei-Jiunn Jeng

A scheme of threshold proxy signature with known signers was proposed by Hwang et al. In their scheme, the receiver can identify the proxy signers that actually generated a proxy signature. Tzeng et al. demonstrated that this signature scheme is insecure and proposed an improvement to mend the information leakage. This paper shows that the improved scheme is still insecure under the original si...

2005
Tatiana Melnik Zornitza Genova Prodanoff

This paper describes a class of insecure .NET client applications, which avoid higher layer protocol protection through using a “raw” send and receive API. The .NET Framework rests on many other Microsoft components, including the Windows Driver Model (WDM). This model supports four driver types, two of which were considered in this paper: protocol and miniport drivers. By compiling and executi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید