Results 81 to 90 of about 640,321 (187)

Research and design of the protection scheme on bluetooth location privacy

open access: yesTongxin xuebao, 2011
The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was ...
YU Bin, ZHANG Shun
doaj   +2 more sources

Verifier-based password-authenticated key exchange protocol for three-party

open access: yesTongxin xuebao, 2008
The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the ...
LI Wen-min, WEN Qiao-yan, ZHANG Hua
doaj   +2 more sources

PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation

open access: yesIEEE Open Journal of the Communications Society
The Quantum Key Distribution (QKD) protocol utilizes quantum mechanics principles for cryptographic key exchange, ensuring absolute secrecy. Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent ...
Ashutosh Bhatia   +2 more
doaj   +1 more source

Man-in-the-Middle Attack and Prevention Measures

open access: yes, 2023
Napadi s posrednikom (MITM) predstavljajo veliko grožnjo spletni varnosti, saj lahko napadalci prestrezajo, shranjujejo in uporabljajo osebne podatke, kot so osebni identifikacijski številki (npr. številke potnega lista), številke kreditnih kartic, gesla itd.
openaire   +1 more source

SoK: A Reality Check for DNP3 Attacks 15 Years Later

open access: yesSmart Cities
OT (operational technology) protocols such as DNP3/TCP, commonly used in the electrical utility sector, have become a focal point for security researchers.
Juan David Parra Rodriguez   +5 more
doaj   +1 more source

SAT-based lazy formal analysis method for security protocols

open access: yesTongxin xuebao, 2014
A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,by adding ...
Chun-xiang GU   +4 more
doaj   +2 more sources

A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis

open access: yesInformation
Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training.
Eman Shalabi   +3 more
doaj   +1 more source

Man in The Middle Attacks on Software Defined Network

open access: yes, 2023
Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. One attack type is a Man in the middle attack, this requires the attacker to have access to the data flow that they want to attack ...
openaire   +1 more source

Robust authentication key agreement protocol for cross-domain data security

open access: yesTongxin xuebao
Towards the need for cross-domain data security, a corresponding system model and security model were presented, and a TEE-based robust authenticated key agreement protocol was proposed.
ZHANG Jinghui   +4 more
doaj  

Home - About - Disclaimer - Privacy