Konu "Authentication" için Makale Koleksiyonu listeleme
Toplam kayıt 4, listelenen: 1-4
-
Cracking more password hashes with patterns
(Institute of Electrical and Electronics Engineers, 2015)It is a common mistake of application developers to store user passwords within databases as plaintext or only as their unsalted hash values. Many real-life successful hacking attempts that enabled attackers to get ... -
Physical layer authentication scheme in beamspace MIMO systems
(Institute of Electrical and Electronics Engineers Inc., 2022)The broadcast nature of wireless communication makes it vulnerable to various security threats such as spoofing attacks. Physical layer (PL) authentication has emerged as a promising and powerful approach to secure future ... -
Primary user emulation and jamming attack detection in cognitive radio via sparse coding
(Springer, 2020)Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade ... -
Towards a unified framework for physical layer security in 5G and beyond networks
(IEEE-Institute of Electrical and Electronics Engineers Inc., 2022)Wireless systems have become an increasingly pivotal part of our lives. Various critical applications and use cases such as healthcare, financial transactions, e-commerce, transportation, industrial automation, etc. rely ...