Results 21 to 30 of about 409,625 (195)
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT).
Shehzad Ashraf Chaudhry +3 more
doaj +1 more source
Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment
Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the ...
Ali Saeed Almuflih +5 more
doaj +1 more source
With regard to the privacy of client-server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone ...
Wanjun Xiong +5 more
doaj +1 more source
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks.
Fedrizzi, A. +8 more
core +1 more source
MPTCP robustness against large-scale man-in-the-middle attacks [PDF]
Abstract Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed at large scale. Recently, the Multipath Transmission Control Protocol (MPTCP) extension was standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers ...
Phung, Chi-Dung +3 more
openaire +2 more sources
Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
If an eavesdropper succeeds in compromising the quantum as well as the classical channels and mimics the receiver "Bob" for the sender "Alice" and vice versa, one defence strategy is the successive, temporally interlocked partial transmission of the ...
Svozil, Karl
core +2 more sources
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by Web-based attacks.
Muteeb Bin Muzammil +4 more
doaj +1 more source
Secure Communication using Identity Based Encryption [PDF]
Secured communication has been widely deployed to guarantee confidentiality and\ud integrity of connections over untrusted networks, e.g., the Internet.
Cheng, Feng +3 more
core +6 more sources

