Results 51 to 60 of about 640,321 (187)

Vulnerabilities in Quantum Key Distribution Protocols [PDF]

open access: yes, 2003
Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return
Kuhn, D. Richard
core   +1 more source

A Fault Analytic Method against HB+ [PDF]

open access: yes, 2010
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family.
Carrijo, Jose   +2 more
core   +2 more sources

Automatic detection method of software upgrade vulnerability based on network traffic analysis

open access: yes网络与信息安全学报, 2020
During the software upgrade process, the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.
TENG Jinhui, GUANG Yan, SHU Hui, ZHANG Bing
doaj   +1 more source

Tool for the Analysis of Network Wireless Security [PDF]

open access: yes, 2014
Tato práce se zabývá bezpečností bezdrátových sítí a počítačovými útoky. Obsahuje popis různých zabezpečení sítí, nejznámějších útoků a nástrojů, kterými jsou útoky proveditelné.
Šenovský, Jakub
core  

Man in the middle attack on HTTPS protocol

open access: yesScientific Bulletin of Naval Academy, 2020
A "man-in-the-middle" (MITM) attack occurs when an external entity intercepts communication between two systems. This can happen for any form of online communication, such as e-mail, websites social networking and web browsing. Not only does it try to listen to your private conversations, but it also steals all the information from your devices.
openaire   +1 more source

Man in the Middle Attacks: Analysis, Motivation and Prevention

open access: yesInternational Journal of Computer Networks and Communications Security, 2020
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it.
Danish Javeed, Umar MohammedBadamasi
openaire   +1 more source

Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

open access: yesIEEE Access
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by Web-based attacks.
Muteeb Bin Muzammil   +4 more
doaj   +1 more source

A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge

open access: yesJurnal Nasional Pendidikan Teknik Informatika (JANAPATI)
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida   +5 more
doaj   +1 more source

Secure access to information panel [PDF]

open access: yes, 2012
Bakalářská práce se zabývá zabezpečeným přístupem k informačnímu panelu, která řeší metody komunikace informačních panelů s řídící jednotkou. Jsou zde popsána komunikační rozhraní. Práce je zaměřena především na komunikační protokoly a metody zabezpečení
Procházka, Jaroslav
core  

Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise

open access: yes, 2006
First, we show a new inexpensive defense against intruders and the man-in-the-middle attack in the Kirchhoff's-loop-Johnson-like-noise (KLJN) cipher. Then instead of point-to-point communication, we propose a high efficiency, secure network.
Kish, Laszlo B., Mingesz, Robert
core   +1 more source

Home - About - Disclaimer - Privacy