نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2011
Sunil Kumar Mandeep Singh Monika Sachdeva Krishan Kumar Bhai Maha Singh

In present era, the world is highly dependent on the Internet and it is considered as main infrastructure of the global information society. Therefore, the Availability of information and services is very critical for the socio-economic growth of the society. However, the inherent vulnerabilities of the Internet architecture provide opportunities for a lot of attacks on its infrastructure and s...

2007
Mun Choon Chan Aurel A. Lazar Rolf Stadler

ion Mechanism Network Abstracted Abstraction Control Parameter Emulation Monitoring Parameters Emulation Networkion Control Parameter Emulation Monitoring Parameters Emulation Network Abstraction Emulatedion Emulated Emulation Control Parameters Emulation Monitoring Parameters Abstraction Control Parameterion Control Parameter

2012
Hyung-Kyu Yang Young-Hwa An

Abstract Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2006, Khan et al.[12] proposed an improved fingerprint-based remote user authentication scheme using smart cards that is achieved mutual authentication between the user and the server, while eliminating the drawback of Lee...

2017
Rizwan ur Rahman Deepak Singh Tomar

Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring modul...

2009
Seungjoo Kim

Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.’s protocol is not secure to randoml...

2013
Ruhul Amin Tanmoy Maitra Soumya Prakash Rana

User authentication is one of the fundamental procedures to provide secure communications between user and server over an insecure public channel. Recently, Wang et. al. proposed password-based user authentication scheme based on hash function and modular exponentiation and they claimed that their scheme provides strong authentication than related scheme. But in this paper, it is pointed out th...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :International Journal for Information Security Research 2012

Journal: :IEEE Computer 2000
Cindy Zheng Carol L. Thompson

T ransitioning to a new architecture is never easy. Users want to keep running their favorite applications as they normally would, without stopping to adapt them to a different platform. For some legacy applications the problem is more severe. Without all the source code, it is impossible to recompile the application to a new platform. Thus, porting these legacy applications is not just slow—it...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید