Results 91 to 100 of about 409,625 (195)
In Wise Information Technology of Medicine, to ensure both confidentiality and integrity of the data created during online joint consultations, and to solve the problem that ordinary users cannot afford expensive quantum devices and are vulnerable to man-
XiYuan Liang +3 more
doaj +1 more source
The Protection of electric drive systems is significant in modern industrial applications to ensure reliable operations. These systems consist of multiple interconnected control units that communicate wirelessly, making them vulnerable to cyber threats ...
J. Dheeba +3 more
doaj +1 more source
Authenticated tree parity machine key exchange
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi +2 more
doaj +1 more source
Ethernet Passive Mutual Authentication Scheme on Quantum Networks
In the context of increasing demand for secure and efficient communication networks, addressing the issue of mutual authentication in ethernet passive optical networks (EPONs) has become both valuable and practically significant.
Jianuo Tian +3 more
doaj +1 more source
Man-in-the-Middle Attack and Prevention Measures
Napadi s posrednikom (MITM) predstavljajo veliko grožnjo spletni varnosti, saj lahko napadalci prestrezajo, shranjujejo in uporabljajo osebne podatke, kot so osebni identifikacijski številki (npr. številke potnega lista), številke kreditnih kartic, gesla itd.
openaire +1 more source
CONVEYOR ANALOG OF MATRIX DIFFIE-HELLMAN PROOTOKOL
A variant of the construction of the matrix analog of Diffie-Hellman based on pipelined binary update secret element used to generate the secret key encryption legalized subscribers open network.
A.J. Beletsky, А.А. Beletsky
doaj
Intelligent Transport Systems (ITSs) are essential for secure and privacy-preserving communications in Autonomous Vehicles (AVs) and enhance facilities like connectivity and roadside assistance.
Tariq Alqubaysi +4 more
doaj +1 more source
With the explosion of vehicle-to-infrastructure (V2I) communications in the internet of vehicles (IoV), it is still very important to ensure secure authentication and efficient key agreement because of the vulnerabilities in the existing protocols such ...
Ming Yuan, Yuelei Xiao
doaj +1 more source
Man in The Middle Attacks on Software Defined Network
Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. One attack type is a Man in the middle attack, this requires the attacker to have access to the data flow that they want to attack ...
openaire +1 more source

