Results 11 to 20 of about 308,714 (183)

A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications

open access: yesScientific Journal of Informatics, 2018
Nowadays, everything is within our grasp and with the mobile phones become easier. Its use is not limited to calls and SMS but has become a tool that can be used to serve business transactions, banking, academic of data through mobile applications.
Aji Purwinarko, Wahyu Hardyanto
doaj   +1 more source

On the Detection of Fake Certificates via Attribute Correlation

open access: yesEntropy, 2015
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authentication ...
Xiaojing Gu, Xingsheng Gu
doaj   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

Malicious Data Frame Injection Attack Without Seizing Association in IEEE 802.11 Wireless LANs

open access: yesIEEE Access, 2021
In the infrastructure mode of IEEE 802.11 wireless local area networks (LANs), an access point (AP) provides wireless networking to multiple wireless client nodes in the shared medium.
Woocheol Kim, Soyeon Kim, Hyuk Lim
doaj   +1 more source

Man-In-The-Middle Attack

open access: yesEuropean Journal of Science and Technology, 2022
Everyone has accepted that the most vital resource of our age is information. As information is felt more and more as a power factor, great changes are taking place in our ways of thinking and perceiving, our research methods and our lifestyles. In this context, the importance of cyber threats has emerged especially in recent years and the ways to ...
openaire   +2 more sources

Techno-Economic Aspect of the Man-in-the-Middle Attacks

open access: yesCommunications, 2017
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac   +3 more
doaj   +1 more source

Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency

open access: yesIEEE Access, 2020
As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference.
Yaoqi Yang   +5 more
doaj   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Analysis of Message Attacks in Aviation Data-Link Communication

open access: yesIEEE Access, 2018
In aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information.
Ru Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy