Results 31 to 40 of about 308,714 (183)
Bitcoin over Tor isn't a good idea [PDF]
Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging
Biryukov, Alex, Pustogarov, Ivan
core +4 more sources
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate ...
Zhiqiang YAO, Zhirong ZHU, Guohua YE
doaj +2 more sources
MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain +2 more
doaj +1 more source
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source
DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks [PDF]
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those ...
Alicherry, Mansoor +1 more
core +2 more sources
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G. +2 more
core +1 more source
Deep Random based Key Exchange protocol resisting unlimited MITM
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon +4 more
core +1 more source
Verifiable three-party secure key exchange protocol based on eigenvalue
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG +3 more
doaj +2 more sources
Exploiting Maritime Wi-Fi: Practical Assessment of Onboard Network Vulnerabilities
With the growing integration of digital technologies on modern vessels, ranging from satellite links and mobile networks to onboard Wi-Fi, the exposure of maritime systems to cyber threats has become a pressing concern.
Marko Vukšić +3 more
doaj +1 more source

