Now showing items 1-6 of 6
A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures
The scope, scale, and intensity of real, as well as potential, attacks on the Smart Grid have been increasing and thus gaining more attention. An important component of the Smart Grid cybersecurity efforts addresses the ...
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
The main goal in the design of ThreeBallot system was to provide an end-to-end auditable voting system in a simple way without use of cryptography to bolster voter confidence in the system. However, later it was shown that ...
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems
IT system risk assessments are indispensable due to increasing cyber threats within our ever-growing IT systems. Moreover, laws and regulations urge organizations to conduct risk assessments regularly. Even though there ...
Towards Making Accessible Human-Interaction Proofs More Secure and Usable
Human-Interaction Proof (HIP) systems are widely used to prevent malicious acts of abusers. Legitimate users, however, are not satisfied with their ease of use. The response of Google to the complaints of difficulty in ...
TwinCloud: Secure Cloud Sharing Without Explicit Key Management
In this paper, we propose TwinCloud as a client-side solution providing a secure system to users without compromising the usability of cloud sharing. TwinCloud brings a novel solution to the complex key exchange problem ...
Mobile Authentication Secure Against Man-In-The-Middle Attacks
(ELSEVIER Science BV, 2014)
Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle ...