Results 21 to 30 of about 409,625 (195)

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems

open access: yesIEEE Access, 2020
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT).
Shehzad Ashraf Chaudhry   +3 more
doaj   +1 more source

Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment

open access: yesApplied Sciences, 2022
Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the ...
Ali Saeed Almuflih   +5 more
doaj   +1 more source

An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification

open access: yesIEEE Access, 2018
With regard to the privacy of client-server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone ...
Wanjun Xiong   +5 more
doaj   +1 more source

A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

open access: yes, 2004
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks.
Fedrizzi, A.   +8 more
core   +1 more source

MPTCP robustness against large-scale man-in-the-middle attacks [PDF]

open access: yesComputer Networks, 2019
Abstract Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed at large scale. Recently, the Multipath Transmission Control Protocol (MPTCP) extension was standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers ...
Phung, Chi-Dung   +3 more
openaire   +2 more sources

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

open access: yes, 2005
If an eavesdropper succeeds in compromising the quantum as well as the classical channels and mimics the receiver "Bob" for the sender "Alice" and vice versa, one defence strategy is the successive, temporally interlocked partial transmission of the ...
Svozil, Karl
core   +2 more sources

Key exchange with the help of a public ledger

open access: yes, 2017
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir   +9 more
core   +1 more source

Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

open access: yesIEEE Access
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by Web-based attacks.
Muteeb Bin Muzammil   +4 more
doaj   +1 more source

Secure Communication using Identity Based Encryption [PDF]

open access: yes, 2010
Secured communication has been widely deployed to guarantee confidentiality and\ud integrity of connections over untrusted networks, e.g., the Internet.
Cheng, Feng   +3 more
core   +6 more sources

Home - About - Disclaimer - Privacy