Results 11 to 20 of about 409,625 (195)

MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma   +4 more
core   +5 more sources

Mobile Authentication Secure against Man-in-the-Middle Attacks

open access: yes2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2014
AbstractCurrent mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop.
Bicakci, Kemal   +3 more
openaire   +4 more sources

Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

open access: yesIET Cyber-Physical Systems, 2021
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo   +6 more
doaj   +1 more source

Detecting Man-in-the-Middle Attacks by Precise Timing [PDF]

open access: yes2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless ...
Aziz, Benjamin, Hamilton, G.
openaire   +2 more sources

A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications

open access: yesScientific Journal of Informatics, 2018
Nowadays, everything is within our grasp and with the mobile phones become easier. Its use is not limited to calls and SMS but has become a tool that can be used to serve business transactions, banking, academic of data through mobile applications.
Aji Purwinarko, Wahyu Hardyanto
doaj   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

On the Detection of Fake Certificates via Attribute Correlation

open access: yesEntropy, 2015
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authentication ...
Xiaojing Gu, Xingsheng Gu
doaj   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Techno-Economic Aspect of the Man-in-the-Middle Attacks

open access: yesCommunications, 2017
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac   +3 more
doaj   +1 more source

Multiple attacks of transient monocular visual loss in a previously healthy man: a possible complication after COVID-19 vaccination?

open access: yesInternational Journal of Retina and Vitreous, 2022
Background The present case aims to describe a previously healthy man who presented multiple attacks of transient monocular visual loss after Pfizer-BioNTech COVID-19 vaccination and to discuss the possible mechanisms related to occurrence of this ...
Leonardo Provetti Cunha   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy