Results 11 to 20 of about 409,625 (195)
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma +4 more
core +5 more sources
Mobile Authentication Secure against Man-in-the-Middle Attacks
AbstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop.
Bicakci, Kemal +3 more
openaire +4 more sources
Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo +6 more
doaj +1 more source
Detecting Man-in-the-Middle Attacks by Precise Timing [PDF]
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless ...
Aziz, Benjamin, Hamilton, G.
openaire +2 more sources
A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications
Nowadays, everything is within our grasp and with the mobile phones become easier. Its use is not limited to calls and SMS but has become a tool that can be used to serve business transactions, banking, academic of data through mobile applications.
Aji Purwinarko, Wahyu Hardyanto
doaj +1 more source
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core +2 more sources
On the Detection of Fake Certificates via Attribute Correlation
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authentication ...
Xiaojing Gu, Xingsheng Gu
doaj +1 more source
Analysis and Verification of IPSec VPN Security Vulnerability [PDF]
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj +1 more source
Techno-Economic Aspect of the Man-in-the-Middle Attacks
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac +3 more
doaj +1 more source
Background The present case aims to describe a previously healthy man who presented multiple attacks of transient monocular visual loss after Pfizer-BioNTech COVID-19 vaccination and to discuss the possible mechanisms related to occurrence of this ...
Leonardo Provetti Cunha +6 more
doaj +1 more source

