Results 31 to 40 of about 308,714 (183)

Bitcoin over Tor isn't a good idea [PDF]

open access: yes, 2014
Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging
Biryukov, Alex, Pustogarov, Ivan
core   +4 more sources

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]

open access: yes, 2016
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan   +8 more
core   +3 more sources

Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement

open access: yesTongxin xuebao, 2021
In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate ...
Zhiqiang YAO, Zhirong ZHU, Guohua YE
doaj   +2 more sources

MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]

open access: yesProceedings on Engineering Sciences
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain   +2 more
doaj   +1 more source

Key exchange with the help of a public ledger

open access: yes, 2017
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir   +9 more
core   +1 more source

DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks [PDF]

open access: yes, 2009
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those ...
Alicherry, Mansoor   +1 more
core   +2 more sources

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

Deep Random based Key Exchange protocol resisting unlimited MITM

open access: yes, 2018
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon   +4 more
core   +1 more source

Verifiable three-party secure key exchange protocol based on eigenvalue

open access: yesTongxin xuebao, 2019
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG   +3 more
doaj   +2 more sources

Exploiting Maritime Wi-Fi: Practical Assessment of Onboard Network Vulnerabilities

open access: yesJournal of Marine Science and Engineering
With the growing integration of digital technologies on modern vessels, ranging from satellite links and mobile networks to onboard Wi-Fi, the exposure of maritime systems to cyber threats has become a pressing concern.
Marko Vukšić   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy