Results 41 to 50 of about 409,625 (195)

Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model [PDF]

open access: yes, 2006
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks. In an
Deng, Yi   +2 more
core   +3 more sources

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]

open access: yes, 2018
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny   +13 more
core   +2 more sources

Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems

open access: yesMathematics
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj   +1 more source

Resilient Distributed Optimization Algorithms for Resource Allocation [PDF]

open access: yes, 2019
Distributed algorithms provide flexibility over centralized algorithms for resource allocation problems, e.g., cyber-physical systems. However, the distributed nature of these algorithms often makes the systems susceptible to man-in-the-middle attacks ...
Alizadeh, Mahnoosh   +2 more
core   +1 more source

An Improvement on Remote User Authentication Schemes Using Smart Cards

open access: yesComputers, 2018
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password ...
Chin-Ling Chen   +4 more
doaj   +1 more source

Proximity Assurances Based on Natural and Artificial Ambient Environments [PDF]

open access: yes, 2017
Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance of devices involved in a transaction beyond their operating environment.
Akram, Raja   +4 more
core   +2 more sources

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Concurrent Non-Malleable Commitments (and More) in 3 Rounds [PDF]

open access: yes, 2016
The round complexity of commitment schemes secure against man-in-the-middle attacks has been the focus of extensive research for about 25 years. The recent breakthrough of Goyal et al.
Ciampi, Michele   +3 more
core   +2 more sources

Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks

open access: yesScientific Reports
The growing number of connected devices in smart home environments has amplified security risks, particularly from Man-in-the-Middle (MitM) attacks. These attacks allow cybercriminals to intercept and manipulate communication streams between devices ...
V. Kandasamy, A. Ameelia Roseline
doaj   +1 more source

Home - About - Disclaimer - Privacy