Results 71 to 80 of about 308,714 (183)
Election systems often face severe challenges regarding security and trust. Threats such as vote falsification and lack of transparency in vote counting have shaken the integrity of elections in various countries.
Sonitema Laia, Ari Moesriami Barmawi
doaj +1 more source
An elderly man with an air-fluid level in the middle ear [PDF]
A 68-year-old Malay man who is a rubber tapper, presented with a large painful right-sided neck swelling for 6 months, which was gradually increasing in size and associated with odynophagia, dysphagia, hoarseness and significant weight loss. He did not
Irfan Mohamad , Sakinah Mohamad
doaj
The Quantum Key Distribution (QKD) protocol utilizes quantum mechanics principles for cryptographic key exchange, ensuring absolute secrecy. Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent ...
Ashutosh Bhatia +2 more
doaj +1 more source
Man-In-The-Middle Attacks Targeting Quantum Cryptography
The development of the Willow quantum chip by Google has sparked significant interest in quantum computing, ushering in a new wave of advancements in the field. As quantum computing technology continues to mature, secure quantum communication has garnered increasing attention.
openaire +2 more sources
The latest developments in the Internet of Medical Things (IoMT) have transformed healthcare, allowing for the easy transmission of sensitive data across networked medical equipment.
Mamta Kumari +2 more
doaj +1 more source
Deep learning approaches for protecting IoT devices in smart homes from MitM attacks
The primary objective of this paper is to enhance the security of IoT devices in Software-Defined Networking (SDN) environments against Man-in-the-Middle (MitM) attacks in smart homes using Artificial Intelligence (AI) methods as part of an Intrusion ...
Nader Karmous +6 more
doaj +1 more source
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
The proliferation of Internet of Things (IoT) devices and big data has catalyzed the emergence of data markets. Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while ...
Nikola Gavric +4 more
doaj +1 more source
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded. [PDF]
Vergoossen T +3 more
europepmc +1 more source
Quantum man-in-the-middle attack on the calibration process of quantum key distribution. [PDF]
Fei YY, Meng XD, Gao M, Wang H, Ma Z.
europepmc +1 more source
Robust authentication key agreement protocol for cross-domain data security
Towards the need for cross-domain data security, a corresponding system model and security model were presented, and a TEE-based robust authenticated key agreement protocol was proposed.
ZHANG Jinghui +4 more
doaj

