Results 11 to 20 of about 640,321 (187)

Mobile Authentication Secure against Man-in-the-Middle Attacks

open access: yes2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2014
AbstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop.
Bicakci, Kemal   +3 more
openaire   +4 more sources

Man-In-The-Middle Attack

open access: yesEuropean Journal of Science and Technology, 2022
Everyone has accepted that the most vital resource of our age is information. As information is felt more and more as a power factor, great changes are taking place in our ways of thinking and perceiving, our research methods and our lifestyles. In this context, the importance of cyber threats has emerged especially in recent years and the ways to ...
openaire   +2 more sources

Detecting Man-in-the-Middle Attacks by Precise Timing [PDF]

open access: yes2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless ...
Aziz, Benjamin, Hamilton, G.
openaire   +2 more sources

Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency

open access: yesIEEE Access, 2020
As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference.
Yaoqi Yang   +5 more
doaj   +1 more source

Impact of Cyber-Attacks on Economy of Smart Grid and their Prevention

open access: yesU.Porto Journal of Engineering, 2022
The technical improvements in modern power systems by the use of smart sensors, smart meters, multi-direction communication networks, and computers have given birth to the cyber-physical smart grid networks. Any attack on the grid is a threat to the grid'
Soumya Mudgal   +6 more
doaj   +1 more source

Analysis of Message Attacks in Aviation Data-Link Communication

open access: yesIEEE Access, 2018
In aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information.
Ru Zhang   +3 more
doaj   +1 more source

Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card [PDF]

open access: yes, 2013
Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel.
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core   +1 more source

Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols

open access: yesMathematics, 2021
This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) problem.
Siniša Tomović   +2 more
doaj   +1 more source

Learning-Based Secret Key Generation in Relay Channels Under Adversarial Attacks

open access: yesIEEE Open Journal of Vehicular Technology, 2023
Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for securing the sixth generation (6G) wireless networks thanks to its inherently lightweight functionality.
Mehdi Letafati   +3 more
doaj   +1 more source

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications [PDF]

open access: yes, 2013
A suitable key agreement protocol plays an essential role in protecting the communications over open channels among users using Voice over Internet Protocol (VoIP).
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core   +1 more source

Home - About - Disclaimer - Privacy