Results 51 to 60 of about 308,714 (183)

Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise

open access: yes, 2006
First, we show a new inexpensive defense against intruders and the man-in-the-middle attack in the Kirchhoff's-loop-Johnson-like-noise (KLJN) cipher. Then instead of point-to-point communication, we propose a high efficiency, secure network.
Kish, Laszlo B., Mingesz, Robert
core   +1 more source

Tool for the Analysis of Network Wireless Security [PDF]

open access: yes, 2014
Tato práce se zabývá bezpečností bezdrátových sítí a počítačovými útoky. Obsahuje popis různých zabezpečení sítí, nejznámějších útoků a nástrojů, kterými jsou útoky proveditelné.
Šenovský, Jakub
core  

Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids

open access: yesIEEE Access
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri   +2 more
doaj   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY
ABSTRACTThis article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
openaire   +2 more sources

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Securing Electrical Drive Systems Against Man-in-the-Middle Attacks Using S-Box Optimized AES Encryption

open access: yesIEEE Access
The Protection of electric drive systems is significant in modern industrial applications to ensure reliable operations. These systems consist of multiple interconnected control units that communicate wirelessly, making them vulnerable to cyber threats ...
J. Dheeba   +3 more
doaj   +1 more source

TARN: A SDN-based Traffic Analysis Resistant Network Architecture

open access: yes, 2017
Destination IP prefix-based routing protocols are core to Internet routing today. Internet autonomous systems (AS) possess fixed IP prefixes, while packets carry the intended destination AS's prefix in their headers, in clear text.
Barrineau, Geddings   +5 more
core   +1 more source

Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

open access: yesIEEE Access
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by Web-based attacks.
Muteeb Bin Muzammil   +4 more
doaj   +1 more source

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between
S.K. Hafizul Islam   +5 more
doaj   +1 more source

A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge

open access: yesJurnal Nasional Pendidikan Teknik Informatika (JANAPATI)
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy