Results 131 to 140 of about 308,714 (183)
Some of the next articles are maybe not open access.

The Man-in-the-Middle Defence

2009
Eliminating middlemen from security protocols helps less than one would think. EMV electronic payments, for example, can be made fairer by adding an electronic attorney --- a middleman which mediates access to a customer's card. We compare middlemen in crypto protocols and APIs with those in the real world, and show that a man-in-the-middle defence is ...
Ross Anderson, Mike Bond
openaire   +2 more sources

The Man in the Middle

The China Quarterly, 1995
When David Wilson was appointed editor, one of the best-known American sinological professors who knew both of us wrote to congratulate me, saying I had the ideal qualifications for the job. But I was surprised all the same when my name was put forward to succeed David in the editorial chair.
openaire   +1 more source

/ A Man in the Middle

2000
Abstract With its rapid growth, Methodism’s relations with the Anglican religious establishment became increasingly strained. In Charles’s mind, Methodists were simply another religious society within the Church of England, but several of the societies in which the Wesleys participated (Shaw’s and Fetter Lane) were drifting away from ...
openaire   +1 more source

Man-in-the-Middle Attack Prevention

2021
Man-in-the-Middle is the one thing that breaks the security paradigm for encrypted data in transit. It can raise significant doubts in the minds of customers about a company’s ability to secure customer data in transit. This chapter discusses Man-in-the-Middle At-tack Prevention through the protection schemes of client and server certificate pinning ...
openaire   +1 more source

Characterizing Wi-Fi Man-In-the-Middle Attacks

2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science, 2020
Wi-Fi networks are widely deployed and used privately or professionally. However, many tools exist to implement Man-in-The-Middle attacks, on these networks, to intercept data. If certain Wi-Fi networks are protected, we all by negligence or compellingly use unprotected or poorly protected Wi-Fi networks, making it possible for attackers to collect ...
Andy Amoordon   +2 more
openaire   +1 more source

A man-in-the-middle attack on UMTS

Proceedings of the 3rd ACM workshop on Wireless security, 2004
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber regardless of the fact that UMTS authentication and key agreement are used.
Ulrike Meyer, Susanne Wetzel
openaire   +1 more source

“The Man in the Middle”

2017
The study of frontline supervisors—in the factory, office, hospital ward, and academic workplace—is once again making waves. The quest for a more efficient, and perhaps more humane, workplace all too often begins with advice and admonition directed toward those who are charged with supervising the daily work lives of the dozen or so individuals who ...
openaire   +1 more source

Man-in-the-Middle Attacks Evolved... but Our Security Models Didn’t

2017
The security community seems to be thoroughly familiar with man-in-the-middle attacks. However, the common perception of this type of attack is outdated. It originates from when network connections were fixed, not mobile, before 24/7 connectivity became ubiquitous.
Jonker, Hugo   +2 more
openaire   +2 more sources

Catching the fraudulent Man-in-the-Middle

Network Security, 2012
There is mounting pressure on companies to detect fraud perpetrated by the new generation of cyber-fraudsters who are becoming adept at impersonating genuine customers by being the Man-in-the-Middle or the Man-in-the-Browser. However, there are technologies available now that can help to detect where fraudsters are operating in this way.
openaire   +1 more source

John Coltrane A Man in the Middle

1993
Abstract John Coltrane had his followers, imitators, and popularizers from the time that he was first a member of Miles Davis ‘s quintet in 1955. There were musicians who show the effect of his playing at almost every stage of his career, and that fact reminds us that he was an importantjazzman. It also reminds us of how much his playing
openaire   +1 more source

Home - About - Disclaimer - Privacy