Results 1 to 10 of about 409,625 (195)

Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded [PDF]

open access: yesEntropy, 2019
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (
Tom Vergoossen   +3 more
doaj   +6 more sources

Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies [PDF]

open access: yesSensors, 2018
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision ...
Farhan Ahmad   +4 more
doaj   +4 more sources

DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks [PDF]

open access: yes2009 IEEE Symposium on Computers and Communications, 2009
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those ...
Alicherry, Mansoor   +1 more
core   +4 more sources

The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers [PDF]

open access: yesSensors
The trend in self-tracking devices has remained unabated for years. Even if they record a large quantity of sensitive data, most users are not concerned about their data being transmitted and stored in a secure way from the device via the companion app ...
Hannah Greß   +2 more
doaj   +2 more sources

Preventing man-in-the-middle attacks in DNS through certificate less signature

open access: yes网络与信息安全学报, 2021
Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed. The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency ...
HU Yang, HAN Zengjie, YE Guohua   +1 more
doaj   +3 more sources

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms

open access: yesFuture Internet, 2023
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
Ugochukwu Onyekachi Obonna   +6 more
doaj   +1 more source

Hardware Man-in-the-Middle Attacks on Smartphones [PDF]

open access: yesForensic Science Today, 2020
With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are discovered by the manufacturers.
Khelif, Mohamed Amine   +2 more
openaire   +1 more source

Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study

open access: yesApplied Sciences, 2021
The low-power wide-area (LPWA) technologies, which enable cost and energy-efficient wireless connectivity for massive deployments of autonomous machines, have enabled and boosted the development of many new Internet of things (IoT) applications; however,
Ondrej Pospisil   +4 more
doaj   +1 more source

Semi-Quantum Identification without Information Leakage

open access: yesMathematics, 2023
In 2019, Zhou et al. proposed semi-quantum identification (also known as semi-quantum authentication, SQA), which proceeds under a measure-resend and measurement-free environment.
Chun-Wei Yang   +3 more
doaj   +1 more source

Man-In-The-Middle Attack

open access: yesEuropean Journal of Science and Technology, 2022
Everyone has accepted that the most vital resource of our age is information. As information is felt more and more as a power factor, great changes are taking place in our ways of thinking and perceiving, our research methods and our lifestyles. In this context, the importance of cyber threats has emerged especially in recent years and the ways to ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy