Enhancing Passwords Security Using Deceptive Covert Communication.
Mohammed H. AlmeshekahMikhail J. AtallahEugene H. SpaffordPublished in: SEC (2015)
Keyphrases
- information security
- information flow
- deception detection
- communication protocols
- authentication systems
- network security
- user authentication
- access control
- information processing systems
- communication networks
- security requirements
- sensitive data
- security systems
- network management
- intrusion detection
- computer networks
- security issues
- communication systems
- computer security
- information exchange
- security policies
- security mechanisms
- communication protocol
- information systems
- security threats
- physical layer
- cyber physical systems
- information sharing
- security protocols
- authentication protocol
- security level
- data acquisition
- secure communication
- key players
- wireless sensor networks