Results 151 to 160 of about 640,321 (187)
Some of the next articles are maybe not open access.

Impact of Man-In-The-Middle Attacks on Ethereum

2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 2018
Recent theoretical attacks conjectured the vulnerabilities of mainstream blockchains through simulations or assumption violations. Unfortunately, previous results typically omit both the nature of the network under which the blockchain code runs and whether blockchains are private, consortium or public.
Parinya Ekparinya   +2 more
openaire   +1 more source

“Man in the Middle” Attacks on Bluetooth

2003
Bluetooth is a short range wireless communication technology that has been designed to eliminate wires between both stationary and mobile devices. As wireless communication is much more vulnerable to attacks, Bluetooth provides authentication and encryption on the link level.
openaire   +1 more source

ARP Spoofing in Launching Man-in-the-Middle Attack

2023
Man-in-the-Middle (MITM) attack is a typical eavesdropping cyberattack. The attacker can launch a MITM attack whenever the attacker and victims are on the same network. Here is a scenario: A MITM attacker connects to Subway’s Wi-Fi and waits for the victim to connect to the Subway Wi-Fi.
Soon Qi Huan, Vinesha Selvarajah
openaire   +1 more source

Man in the Middle Attack on NTRU Key Exchange

2018
A cryptographic scheme is as strong as its underlying key exchange algorithm. In this paper we explored NTRU key exchange and found that it is exposed to Man In The Middle (MITM) attack. Similar vulnerability has been found in original Diffie-Hellman key exchange and prevented using Zero Knowledge Proof (ZKP). We applied ZKP scheme to solve the lattice
Vijay Kumar Yadav   +2 more
openaire   +1 more source

Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack

2018 6th International Conference on Information and Communication Technology (ICoICT), 2018
In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key agreement. We demonstrate that the conventional version of this protocol is vulnerable to the man-in-the-middle attack. Hence, to avert such attack, we propose an authenticated version of this protocol using an embedded digital ...
openaire   +1 more source

Optimal Man-In-The-Middle Stealth Attack

2021
Luca Faramondi   +2 more
openaire   +1 more source

MAN-IN-THE-MIDDLE ATTACK

International Journal of Recent Advancement in Engineering & Research, 2017
openaire   +1 more source

Integrative oncology: Addressing the global challenges of cancer prevention and treatment

Ca-A Cancer Journal for Clinicians, 2022
Jun J Mao,, Msce   +2 more
exaly  

Home - About - Disclaimer - Privacy