Results 41 to 50 of about 409,625 (195)
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model [PDF]
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks. In an
Deng, Yi +2 more
core +3 more sources
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny +13 more
core +2 more sources
Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj +1 more source
Resilient Distributed Optimization Algorithms for Resource Allocation [PDF]
Distributed algorithms provide flexibility over centralized algorithms for resource allocation problems, e.g., cyber-physical systems. However, the distributed nature of these algorithms often makes the systems susceptible to man-in-the-middle attacks ...
Alizadeh, Mahnoosh +2 more
core +1 more source
An Improvement on Remote User Authentication Schemes Using Smart Cards
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password ...
Chin-Ling Chen +4 more
doaj +1 more source
Proximity Assurances Based on Natural and Artificial Ambient Environments [PDF]
Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance of devices involved in a transaction beyond their operating environment.
Akram, Raja +4 more
core +2 more sources
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G. +2 more
core +1 more source
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
Concurrent Non-Malleable Commitments (and More) in 3 Rounds [PDF]
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the focus of extensive research for about 25 years. The recent breakthrough of Goyal et al.
Ciampi, Michele +3 more
core +2 more sources
The growing number of connected devices in smart home environments has amplified security risks, particularly from Man-in-the-Middle (MitM) attacks. These attacks allow cybercriminals to intercept and manipulate communication streams between devices ...
V. Kandasamy, A. Ameelia Roseline
doaj +1 more source

