Results 21 to 30 of about 640,321 (187)

Analisis Serangan Pihak Ketiga pada Protokol Kesepakatan Kunci Diffie-Hellman

open access: yesTechne, 2016
Penemuan protokol kesepakatan kunci Diffie-Hellman merupakan salah satu tonggak penting perkembangan kriptografi dengan menggunakan algoritma kunci publik.
Banu Wirawan Yohanes
doaj   +1 more source

Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment

open access: yesApplied Sciences, 2022
Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the ...
Ali Saeed Almuflih   +5 more
doaj   +1 more source

Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement

open access: yesTongxin xuebao, 2021
In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate ...
Zhiqiang YAO, Zhirong ZHU, Guohua YE
doaj   +2 more sources

Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication [PDF]

open access: yes, 2017
An integrated and optimized smart grid cannot be achieved without a secure communication network. Due to the large-scale nature of the power system, the variety of technologies used, and limitations of communication bandwidth, supervisory applications ...
Grijalva, S., Saxena, N.
core   +1 more source

Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks

open access: yesIEEE Access
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi   +2 more
doaj   +1 more source

DoubleCheck: Multi-path verification against man-in-the-middle attacks [PDF]

open access: yes2009 IEEE Symposium on Computers and Communications, 2009
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those services knows the certificates or host keys a priori. A simple solution used in practice is to trust
Alicherry, Mansoor   +1 more
openaire   +2 more sources

Understanding Man-in-the-middle-attack through Survey of Literature

open access: yesIndonesian Journal of Computing, Engineering and Design, 2019
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped
A. Mallik   +3 more
doaj   +1 more source

Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

open access: yes, 2015
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the
Gottesman   +6 more
core   +1 more source

MPTCP robustness against large-scale man-in-the-middle attacks [PDF]

open access: yesComputer Networks, 2019
Abstract Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed at large scale. Recently, the Multipath Transmission Control Protocol (MPTCP) extension was standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers ...
Phung, Chi-Dung   +3 more
openaire   +2 more sources

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]

open access: yes, 2016
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy