Results 161 to 170 of about 640,321 (187)
Some of the next articles are maybe not open access.

Man-in-the-Middle (MitM) Attacks: Techniques and defenses

World Journal of Advanced Engineering Technology and Sciences
MitM attacks pose a significant risk when unauthorized third parties grab and control the exchanged communications between different parties unnoticed. It describes the main ways a MitM attack can take place, and why knowing about passive and active approaches are crucial.
openaire   +1 more source

Man-in-the-middle attacks on auto-updating software

Bell Labs Technical Journal, 2007
Bjoern M. Luettmann, Adam C. Bender
openaire   +1 more source

Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures

IEEE Transactions on Wireless Communications, 2010
Keijo Haataja, Pekka Toivanen
exaly  

Home - About - Disclaimer - Privacy