Results 21 to 30 of about 308,714 (183)

Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain [PDF]

open access: yesJisuanji kexue, 2022
Blockchain is one of the technical hotspots in recent years,and the research theories related to it are being enriched.However,it is still facing the key problem of small throughput and low processing efficiency before it can be implemented into the ...
LIU Feng, ZHANG Jia-hao, ZHOU Jun-jie, LI Mu, KONG De-li, YANG Jie, QI Jia-yin, ZHOU Ai-min
doaj   +1 more source

Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols

open access: yesMathematics, 2021
This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) problem.
Siniša Tomović   +2 more
doaj   +1 more source

MAN-IN-THE-MIDDLE-ATTACK: UNDERSTANDING IN SIMPLE WORDS [PDF]

open access: yesCyberspace, 2019
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two
Avijit Mallik
doaj   +2 more sources

Learning-Based Secret Key Generation in Relay Channels Under Adversarial Attacks

open access: yesIEEE Open Journal of Vehicular Technology, 2023
Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for securing the sixth generation (6G) wireless networks thanks to its inherently lightweight functionality.
Mehdi Letafati   +3 more
doaj   +1 more source

A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed

open access: yesIEEE Access, 2021
Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and secure operation in presence of ...
Mohammad Noorizadeh   +4 more
doaj   +1 more source

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

open access: yes, 2005
If an eavesdropper succeeds in compromising the quantum as well as the classical channels and mimics the receiver "Bob" for the sender "Alice" and vice versa, one defence strategy is the successive, temporally interlocked partial transmission of the ...
Svozil, Karl
core   +2 more sources

Analisis Serangan Pihak Ketiga pada Protokol Kesepakatan Kunci Diffie-Hellman

open access: yesTechne, 2016
Penemuan protokol kesepakatan kunci Diffie-Hellman merupakan salah satu tonggak penting perkembangan kriptografi dengan menggunakan algoritma kunci publik.
Banu Wirawan Yohanes
doaj   +1 more source

A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

open access: yes, 2004
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks.
Fedrizzi, A.   +8 more
core   +1 more source

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]

open access: yes, 2018
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny   +13 more
core   +2 more sources

Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

open access: yes, 2015
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the
Gottesman   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy