Results 61 to 70 of about 308,714 (183)
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? [PDF]
Pavičić M.
europepmc +1 more source
The Man-in-the-Middle Syndrome
Many superstars have theme songs. Picture how the underwear-wearing WWE beefy men walk to their theme songs. Politicians and political parties have theirs too, and they were prominent in the just-concluded election period in 2022. During this Presidential Election Petition at the Supreme Court of Kenya, we were introduced to a legend of a man-in-the ...
openaire +1 more source
Understanding Man-in-the-middle-attack through Survey of Literature
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped
A. Mallik +3 more
doaj +1 more source
Authenticated tree parity machine key exchange
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core
Spoiled Onions: Exposing Malicious Tor Exit Relays
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core
Network security attacks. ARP Poisoning case study [PDF]
Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic.
Luminiţa DEFTA
core
Cyber-security becomes more and more important as the technology moves forward. Having knowledge about the technologies of the modern world is crucial and helps to make a better and safer environment. This study identifies and demonstrates some of the methods which are used to exploit two or potentially more hosts in a network. Exploiting weaknesses in
openaire +1 more source
Evaluating AES-128 Segment Encryption in Live HTTP Streaming Under Content Tampering and Packet Loss
One of the main sources of entertainment is live video streaming platforms, which allow viewers to watch video streams in real time. However, because of the increasing demand for high quality content, the vulnerability of streaming systems against ...
Bzav Shorsh Sabir, Aree Ali Mohammed
doaj +1 more source
Evil-AP - Mobile Man-in-the-Middle Threat
Clients of public hotspots are exposed to various threats including a man–in–the–middle attacks. To stress existing threats we created the Evil-AP application for demonstrating a man–in–the–middle attack. The application, installed on an Android phone with root permissions, turns on hotspot services and performs network redirection.
Breński, Kamil +2 more
openaire +2 more sources

