Results 41 to 50 of about 640,321 (187)

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

Interactive Password Schemes [PDF]

open access: yes, 2004
Only the abstract is available for this technical report.Usual password schemes suffer from the flaw that they are easy to steal. An attacker who has correctly observed a login session (by peeping, wiretapping and/or by launching a "man-in-the-middle ...
Itkis, Gene, Maiss, Arwa
core   +1 more source

Bitcoin over Tor isn't a good idea [PDF]

open access: yes, 2014
Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging
Biryukov, Alex, Pustogarov, Ivan
core   +4 more sources

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals [PDF]

open access: yes, 2012
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM needs to trust that (a) all communications are indeed carried out with the intended terminal, (b) such communications are confidential, and (c) the terminal’s integrity is guaranteed.
Alpár, G., Hoepman, J.H.
openaire   +4 more sources

Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2016
Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications.
Rizal Munadi   +4 more
doaj   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Exchanging demands: Weaknesses in SSL implementations for mobile platforms [PDF]

open access: yes, 2013
The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement. This paper discusses a proof of concept attack against the implementation of ActiveSync in common Smart phones ...
Carpene, Clinton R   +4 more
core   +2 more sources

A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication

open access: yesFuture Internet, 2019
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational ...
Adeel Abro   +2 more
doaj   +1 more source

Compte-rendu de la 5ème réunion du comité de coordination et de l'atelier "jachère et systèmes agraires" [PDF]

open access: yes, 1998
When making new software systems, security testing should always be included in the process. In this thesis, attacks were identified and performed against a system consisting of two servers and an Android application.
Gyulai, Sofia, Holmgren, William
core  

Quantum Security for the Physical Layer [PDF]

open access: yes, 2013
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections.
Humble, Travis S.
core   +2 more sources

Home - About - Disclaimer - Privacy