Results 51 to 60 of about 640,321 (187)
Vulnerabilities in Quantum Key Distribution Protocols [PDF]
Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return
Kuhn, D. Richard
core +1 more source
A Fault Analytic Method against HB+ [PDF]
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family.
Carrijo, Jose +2 more
core +2 more sources
Automatic detection method of software upgrade vulnerability based on network traffic analysis
During the software upgrade process, the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.
TENG Jinhui, GUANG Yan, SHU Hui, ZHANG Bing
doaj +1 more source
Tool for the Analysis of Network Wireless Security [PDF]
Tato práce se zabývá bezpečností bezdrátových sítí a počítačovými útoky. Obsahuje popis různých zabezpečení sítí, nejznámějších útoků a nástrojů, kterými jsou útoky proveditelné.
Šenovský, Jakub
core
Man in the middle attack on HTTPS protocol
A "man-in-the-middle" (MITM) attack occurs when an external entity intercepts communication between two systems. This can happen for any form of online communication, such as e-mail, websites social networking and web browsing. Not only does it try to listen to your private conversations, but it also steals all the information from your devices.
openaire +1 more source
Man in the Middle Attacks: Analysis, Motivation and Prevention
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it.
Danish Javeed, Umar MohammedBadamasi
openaire +1 more source
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by Web-based attacks.
Muteeb Bin Muzammil +4 more
doaj +1 more source
A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida +5 more
doaj +1 more source
Secure access to information panel [PDF]
Bakalářská práce se zabývá zabezpečeným přístupem k informačnímu panelu, která řeší metody komunikace informačních panelů s řídící jednotkou. Jsou zde popsána komunikační rozhraní. Práce je zaměřena především na komunikační protokoly a metody zabezpečení
Procházka, Jaroslav
core
First, we show a new inexpensive defense against intruders and the man-in-the-middle attack in the Kirchhoff's-loop-Johnson-like-noise (KLJN) cipher. Then instead of point-to-point communication, we propose a high efficiency, secure network.
Kish, Laszlo B., Mingesz, Robert
core +1 more source

