Results 81 to 90 of about 640,321 (187)
Research and design of the protection scheme on bluetooth location privacy
The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was ...
YU Bin, ZHANG Shun
doaj +2 more sources
Verifier-based password-authenticated key exchange protocol for three-party
The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the ...
LI Wen-min, WEN Qiao-yan, ZHANG Hua
doaj +2 more sources
The Quantum Key Distribution (QKD) protocol utilizes quantum mechanics principles for cryptographic key exchange, ensuring absolute secrecy. Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent ...
Ashutosh Bhatia +2 more
doaj +1 more source
Man-in-the-Middle Attack and Prevention Measures
Napadi s posrednikom (MITM) predstavljajo veliko grožnjo spletni varnosti, saj lahko napadalci prestrezajo, shranjujejo in uporabljajo osebne podatke, kot so osebni identifikacijski številki (npr. številke potnega lista), številke kreditnih kartic, gesla itd.
openaire +1 more source
SoK: A Reality Check for DNP3 Attacks 15 Years Later
OT (operational technology) protocols such as DNP3/TCP, commonly used in the electrical utility sector, have become a focal point for security researchers.
Juan David Parra Rodriguez +5 more
doaj +1 more source
Quantum man-in-the-middle attack on the calibration process of quantum key distribution. [PDF]
Fei YY, Meng XD, Gao M, Wang H, Ma Z.
europepmc +1 more source
SAT-based lazy formal analysis method for security protocols
A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,by adding ...
Chun-xiang GU +4 more
doaj +2 more sources
Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training.
Eman Shalabi +3 more
doaj +1 more source
Man in The Middle Attacks on Software Defined Network
Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. One attack type is a Man in the middle attack, this requires the attacker to have access to the data flow that they want to attack ...
openaire +1 more source
Robust authentication key agreement protocol for cross-domain data security
Towards the need for cross-domain data security, a corresponding system model and security model were presented, and a TEE-based robust authenticated key agreement protocol was proposed.
ZHANG Jinghui +4 more
doaj

