Results 41 to 50 of about 640,321 (187)
Secure Algorithms for SAKA Protocol in the GSM Network [PDF]
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core +1 more source
Interactive Password Schemes [PDF]
Only the abstract is available for this technical report.Usual password schemes suffer from the flaw that they are easy to steal. An attacker who has correctly observed a login session (by peeping, wiretapping and/or by launching a "man-in-the-middle ...
Itkis, Gene, Maiss, Arwa
core +1 more source
Bitcoin over Tor isn't a good idea [PDF]
Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging
Biryukov, Alex, Pustogarov, Ivan
core +4 more sources
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals [PDF]
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM needs to trust that (a) all communications are indeed carried out with the intended terminal, (b) such communications are confidential, and (c) the terminal’s integrity is guaranteed.
Alpár, G., Hoepman, J.H.
openaire +4 more sources
Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On
Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications.
Rizal Munadi +4 more
doaj +1 more source
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris +3 more
core +1 more source
Exchanging demands: Weaknesses in SSL implementations for mobile platforms [PDF]
The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement. This paper discusses a proof of concept attack against the implementation of ActiveSync in common Smart phones ...
Carpene, Clinton R +4 more
core +2 more sources
A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational ...
Adeel Abro +2 more
doaj +1 more source
Compte-rendu de la 5ème réunion du comité de coordination et de l'atelier "jachère et systèmes agraires" [PDF]
When making new software systems, security testing should always be included in the process. In this thesis, attacks were identified and performed against a system consisting of two servers and an Android application.
Gyulai, Sofia, Holmgren, William
core
Quantum Security for the Physical Layer [PDF]
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections.
Humble, Travis S.
core +2 more sources

