Results 71 to 80 of about 640,321 (187)
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? [PDF]
Pavičić M.
europepmc +1 more source
Intel Software Guard Extension (SGX) offers software applications enclave to protect their confidentiality and integrity from malicious operating systems.
Almeida José Bacelar +18 more
core +1 more source
Deniable Authentication Protocol Resisting Man-In-The-Middle Attack
Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. The proposed protocol in this paper makes use of bilinear pairings over elliptic curves, as well as the Diffie-Hellman key exchange protocol.
Han, Song, Wanquan Liu, Chang, Elizabeth
openaire +1 more source
Cyber-security becomes more and more important as the technology moves forward. Having knowledge about the technologies of the modern world is crucial and helps to make a better and safer environment. This study identifies and demonstrates some of the methods which are used to exploit two or potentially more hosts in a network. Exploiting weaknesses in
openaire +1 more source
Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj +1 more source
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability— ...
James Jin Kang +2 more
doaj +1 more source
Authenticated tree parity machine key exchange
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core
A Review of Man-in-the-Middle Attacks
This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session ...
openaire +2 more sources
Spoiled Onions: Exposing Malicious Tor Exit Relays
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core
Evaluating AES-128 Segment Encryption in Live HTTP Streaming Under Content Tampering and Packet Loss
One of the main sources of entertainment is live video streaming platforms, which allow viewers to watch video streams in real time. However, because of the increasing demand for high quality content, the vulnerability of streaming systems against ...
Bzav Shorsh Sabir, Aree Ali Mohammed
doaj +1 more source

