Author image not provided
 Mohammed H Almeshekah

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.60
Citation Count6
Publication count10
Publication years2013-2016
Available for download3
Average downloads per article280.67
Downloads (cumulative)842
Downloads (12 Months)439
Downloads (6 Weeks)37
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


10 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 10 of 10
Sort by:

1 published by ACM
December 2016 ACM Transactions on Privacy and Security (TOPS): Volume 19 Issue 3, December 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 19,   Downloads (12 Months): 219,   Downloads (Overall): 237

Full text available: PDFPDF
In this work, we present a simple, yet effective and practical scheme to improve the security of stored password hashes, increasing the difficulty to crack passwords and exposing cracking attempts. We utilize a hardware-dependent function (HDF), such as a physically unclonable function (PUF) or a hardware security module (HSM), at ...
Keywords: HSM, Passwords, authentication, offline dictionary attack, password cracking, PUF, deception

2 published by ACM
December 2015 ACSAC 2015: Proceedings of the 31st Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 8,   Downloads (12 Months): 93,   Downloads (Overall): 300

Full text available: PDFPDF
In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at the same time. We utilize a machine-dependent function, such as a physically unclonable function (PUF) or a hardware security module (HSM) at the ...
Keywords: Deception, HSM, Offline Dictionary Attack, Password Cracking, Passwords, PUF, Authentication

3
March 2015 CERIAS '15: Proceedings of the 16th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes rendering their cracking detectable and insuperable at the same time. We utilize a machine-dependent function, such as a physically unclonable function (PUF) or a hardware security module (HSM) at the ...

4
March 2015 CERIAS '15: Proceedings of the 16th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

Deception is defined as "presenting an altered view of reality" and has been used by mankind for thousands of years to influence other's behavior and decision making. More recently, deception has also been applied to computing in a variety of areas, such as human computer interaction and digital communities. This ...

5
March 2015 CERIAS '15: Proceedings of the 16th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

Hypergames are a branch of game theory to model and analyze game theoretic conflicts between multiple players who may have misconceptions of other player's actions, preferences, and/or knowledge. They have been used to model military conflicts such as the Allied invasion of Normandy in 1945, the fall of France in ...

6 published by ACM
September 2014 NSPW '14: Proceedings of the 2014 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 10,   Downloads (12 Months): 127,   Downloads (Overall): 305

Full text available: PDFPDF
Deceptive techniques played a prominent role in many human conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s. However, many computer defenses that use deception were ad-hoc attempts to incorporate deceptive elements. In this paper, ...
Keywords: computer security, biases, deception

7
July 2014 International Journal of Cyber Warfare and Terrorism: Volume 4 Issue 3, July 2014
Publisher: IGI Global
Bibliometrics:
Citation Count: 0

In this paper the authors present a novel taxonomy of methods and techniques that can be used to protect digital information. The authors discuss how information has been protected and show how we can structure our methods to achieve better results. They explore the relationships among these protection techniques grouped ...
Keywords: Attacker Attribution, Cyber Kill-Chain, Negative Information, Deception, Information Protection

8
March 2014 CERIAS '14: Proceedings of the 15th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0


9
March 2014 CERIAS '14: Proceedings of the 15th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0


10
April 2013 CERIAS '13: Proceedings of the 14th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

We argue the need for providing a covert back-channel communication mechanism in authentication protocols, discuss various practical uses for such a channel, and desirable features for its design and deployment. Such a mechanism would leverage the current authentication channel to carry out the covert communication rather than introducing a separate ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us