Results 161 to 170 of about 409,625 (195)
Some of the next articles are maybe not open access.
“Man in the Middle” Attacks on Bluetooth
2003Bluetooth is a short range wireless communication technology that has been designed to eliminate wires between both stationary and mobile devices. As wireless communication is much more vulnerable to attacks, Bluetooth provides authentication and encryption on the link level.
openaire +1 more source
ARP Spoofing in Launching Man-in-the-Middle Attack
2023Man-in-the-Middle (MITM) attack is a typical eavesdropping cyberattack. The attacker can launch a MITM attack whenever the attacker and victims are on the same network. Here is a scenario: A MITM attacker connects to Subway’s Wi-Fi and waits for the victim to connect to the Subway Wi-Fi.
Soon Qi Huan, Vinesha Selvarajah
openaire +1 more source
Man in the Middle Attack on NTRU Key Exchange
2018A cryptographic scheme is as strong as its underlying key exchange algorithm. In this paper we explored NTRU key exchange and found that it is exposed to Man In The Middle (MITM) attack. Similar vulnerability has been found in original Diffie-Hellman key exchange and prevented using Zero Knowledge Proof (ZKP). We applied ZKP scheme to solve the lattice
Vijay Kumar Yadav +2 more
openaire +1 more source
Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack
2018 6th International Conference on Information and Communication Technology (ICoICT), 2018In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key agreement. We demonstrate that the conventional version of this protocol is vulnerable to the man-in-the-middle attack. Hence, to avert such attack, we propose an authenticated version of this protocol using an embedded digital ...
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly
Secure remote state estimation against linear man-in-the-middle attacks using watermarking
Automatica, 2020Jiahao Huang, Fangfei Li, Wen Yang
exaly
Man-in-the-middle attack against cyber-physical systems under random access protocol
Information Sciences, 2021Guang-Hong Yang
exaly
Man-in-the-Middle (MitM) Attacks: Techniques and defenses
World Journal of Advanced Engineering Technology and SciencesMitM attacks pose a significant risk when unauthorized third parties grab and control the exchanged communications between different parties unnoticed. It describes the main ways a MitM attack can take place, and why knowing about passive and active approaches are crucial.
openaire +1 more source

