Results 91 to 100 of about 409,625 (195)

Three-Party Controlled Authentication Semiquantum Key Agreement Protocol for Online Joint Consultation

open access: yesIEEE Transactions on Quantum Engineering
In Wise Information Technology of Medicine, to ensure both confidentiality and integrity of the data created during online joint consultations, and to solve the problem that ordinary users cannot afford expensive quantum devices and are vulnerable to man-
XiYuan Liang   +3 more
doaj   +1 more source

Securing Electrical Drive Systems Against Man-in-the-Middle Attacks Using S-Box Optimized AES Encryption

open access: yesIEEE Access
The Protection of electric drive systems is significant in modern industrial applications to ensure reliable operations. These systems consist of multiple interconnected control units that communicate wirelessly, making them vulnerable to cyber threats ...
J. Dheeba   +3 more
doaj   +1 more source

Authenticated tree parity machine key exchange

open access: yes, 2004
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core  

Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks

open access: yesIEEE Access
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi   +2 more
doaj   +1 more source

Ethernet Passive Mutual Authentication Scheme on Quantum Networks

open access: yesEntropy
In the context of increasing demand for secure and efficient communication networks, addressing the issue of mutual authentication in ethernet passive optical networks (EPONs) has become both valuable and practically significant.
Jianuo Tian   +3 more
doaj   +1 more source

Man-in-the-Middle Attack and Prevention Measures

open access: yes, 2023
Napadi s posrednikom (MITM) predstavljajo veliko grožnjo spletni varnosti, saj lahko napadalci prestrezajo, shranjujejo in uporabljajo osebne podatke, kot so osebni identifikacijski številki (npr. številke potnega lista), številke kreditnih kartic, gesla itd.
openaire   +1 more source

CONVEYOR ANALOG OF MATRIX DIFFIE-HELLMAN PROOTOKOL

open access: yesÌнформаційні технології в освіті, 2013
A variant of the construction of the matrix analog of Diffie-Hellman based on pipelined binary update secret element used to generate the secret key encryption legalized subscribers open network.
A.J. Beletsky, А.А. Beletsky
doaj  

Federated Learning-Based Predictive Traffic Management Using a Contained Privacy-Preserving Scheme for Autonomous Vehicles

open access: yesSensors
Intelligent Transport Systems (ITSs) are essential for secure and privacy-preserving communications in Autonomous Vehicles (AVs) and enhance facilities like connectivity and roadside assistance.
Tariq Alqubaysi   +4 more
doaj   +1 more source

PMAKA-IoV: A Physical Unclonable Function (PUF)-Based Multi-Factor Authentication and Key Agreement Protocol for Internet of Vehicles

open access: yesInformation
With the explosion of vehicle-to-infrastructure (V2I) communications in the internet of vehicles (IoV), it is still very important to ensure secure authentication and efficient key agreement because of the vulnerabilities in the existing protocols such ...
Ming Yuan, Yuelei Xiao
doaj   +1 more source

Man in The Middle Attacks on Software Defined Network

open access: yes, 2023
Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. One attack type is a Man in the middle attack, this requires the attacker to have access to the data flow that they want to attack ...
openaire   +1 more source

Home - About - Disclaimer - Privacy