Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks.
Jeffrey A. NicholsBenjamin A. TaylorLaura CurtisPublished in: CISRC (2016)
Keyphrases
- security mechanisms
- denial of service attacks
- security problems
- security requirements
- network security
- security threats
- denial of service
- dos attacks
- biometric template
- security issues
- access control
- security protocols
- security level
- computer security
- identity authentication
- information security
- security systems
- user authentication
- java card
- security vulnerabilities
- biometric data
- security services
- security risks
- cyber attacks
- unauthorized access
- security measures
- resource constrained
- public key infrastructure
- authentication mechanism
- fuzzy vault
- operating system
- authentication protocol
- security analysis
- authentication scheme
- smart card
- lightweight
- encryption decryption
- data encryption
- countermeasures
- computer networks
- stream cipher
- security policies
- intrusion detection
- elliptic curve cryptography
- digital watermarking
- ddos attacks
- key distribution
- identity management
- cryptographic protocols
- biometric authentication