18 research outputs found

    Security Protocols: Specification, Verification, Implementation, and Composition

    Get PDF

    Introducing a Machine Learning Password Metric Based on EFKM Clustering Algorithm

    Get PDF
    we introduce a password strength metric using Enhanced Fuzzy K-Means clustering algorithm (EFKM henceforth). The EFKM is trained on the OWASP list of 10002 weak passwords. After that, the optimized centroids are maximized to develop a password strength metric. The resulting meter was validated by contrasting with three entropy-based metrics using two datasets: the training dataset (OWASP) and a dataset that we collected from github website that contains 5189451 leaked passwords. Our metric is able to recognize all the passwords from the OWASP as weak passwords only. Regarding the leaked passwords, the metric recognizes almost the entire set as weak passwords. We found that the results of the EFKM-based metric and the entropy-based meters are consistent. Hence the EFKM metric demonstrates its validity as an efficient password strength checker

    Enhancing Steganography by Image Segmentation and Multi-level Deep Hiding

    Get PDF
    In this paper, we present Modify Deep Hiding Extraction Algorithm (MDHEA) that is a steganography algorithm with Multi-Level Steganography (MLS) and color image segmentation. Through experimental results, MDHEA shows improvement in the results of previous works by securing encrypted secret data against attacks. We use segmentation to choose the appropriate segment, pass it on the cover image, calculate the value of the change at the pixel of the segment and select the best segment and its location in the cover image based on the least effect. MDHEA applies multi-level steganography to hide the confidential data in color images to ensure the integrity of the hidden data and obtain the largest volume of hidden data without distorting the image of the stego image. To reduce distortion in the cover image due to hiding a large amount of secret data and obtaining a high-quality stego image after hiding the secret data, we implement the Blue Smoothing Algorithm (BSA) to achieve smoothing the largest possible number of pixels in the image

    Reducing Power Consumption in Hexagonal Wireless Sensor Networks Using Efficient Routing Protocols

    Get PDF
    Power consumption and network lifetime are vital issues in wireless sensor network (WSN) design. This motivated us to find innovative mechanisms that help in reducing energy consumption and prolonging the lifetime of such networks. In this paper, we propose a hexagonal model for WSNs to reduce power consumption when sending data from sensor nodes to cluster heads or the sink. Four models are proposed for cluster head positioning and the results were compared with well-known models such as Power Efficient Gathering In Sensor Information Systems (PEGASIS) and Low-Energy Adaptive Clustering Hierarchy (LEACH). The results showed that the proposed models reduced WSN power consumption and network lifetime

    Users' Distribution and Behavior in Academic Social Networking Sites

    No full text

    Behind the bedroom door: criminal law's relationship with sexual intercourse

    Get PDF
    This paper defines the \u201cultimate\u201d formal semantics for Alice and Bob notation, i.e., what actions the honest agents have to perform, in the presence of an arbitrary set of cryptographic operators and their algebraic theory. Despite its generality, this semantics is mathematically simpler than any previous attempt. For practical applicability, we introduce the language SPS and an automatic translation to robust real-world implementations and corresponding formal models, and we prove this translation correct with respect to the semantics
    corecore