[HTML][HTML] Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …

Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks

P Gope, AK Das, N Kumar… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …

Memristor-based hyperchaotic maps and application in auxiliary classifier generative adversarial nets

H Bao, Z Hua, H Li, M Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the nonlinearity and plasticity, memristors are widely used as nonlinear devices for
chaotic oscillations or as biological synapses for neuromorphic computations. But discrete …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …