Results 51 to 60 of about 409,625 (195)

Security Analysis and Designing Advanced Two-Party Lattice-Based Authenticated Key Establishment and Key Transport Protocols for Mobile Communication

open access: yesFuture Internet
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication.
Mani Rajendran   +3 more
doaj   +1 more source

An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain

open access: yesIEEE Access, 2019
The fourth industrial revolution (Industry 4.0) is transforming the next generation of the supply chain by making it more agile and efficient compared with the traditional supply chain.
Alireza Esfahani   +7 more
doaj   +1 more source

Deep Random based Key Exchange protocol resisting unlimited MITM

open access: yes, 2018
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon   +4 more
core   +1 more source

A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare

open access: yesDiscover Internet of Things
The latest developments in the Internet of Medical Things (IoMT) have transformed healthcare, allowing for the easy transmission of sensitive data across networked medical equipment.
Mamta Kumari   +2 more
doaj   +1 more source

Analysis of Message Attacks in Aviation Data-Link Communication

open access: yesIEEE Access, 2018
In aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information.
Ru Zhang   +3 more
doaj   +1 more source

Analyzing and Patching SPEKE in ISO/IEC [PDF]

open access: yes, 2018
Simple password exponential key exchange (SPEKE) is a well-known password authenticated key exchange protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products.
Dong, Changyu   +3 more
core   +2 more sources

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

From Prompts to Motors: Man-in-the-Middle Attacks on LLM-Enabled Vacuum Robots

open access: yesIEEE Access
The integration of large language models (LLMs) into robotic platforms is transforming human–robot interaction by enabling more natural communication and adaptive task execution.
Asif Shaikh, Aygun Varol, Johanna Virkki
doaj   +1 more source

Cross-Domain Identity Authentication Scheme Based on Heterogeneous Systems in Hybrid Cloud Environment [PDF]

open access: yesJisuanji gongcheng, 2019
In the hybrid cloud environment,in order to meet the cross-domain authentication requirements of identity authentication schemes between different cryptosystems,a cross-domain identity authentication scheme based on Public Key Infrastructure(PKI) and ...
JIANG Zetao, SHI Chen
doaj   +1 more source

TARN: A SDN-based Traffic Analysis Resistant Network Architecture

open access: yes, 2017
Destination IP prefix-based routing protocols are core to Internet routing today. Internet autonomous systems (AS) possess fixed IP prefixes, while packets carry the intended destination AS's prefix in their headers, in clear text.
Barrineau, Geddings   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy