Results 1 to 10 of about 13,174 (191)
Improved MITM Cryptanalysis on Streebog
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua +5 more
doaj +2 more sources
Deep Random based Key Exchange protocol resisting unlimited MITM [PDF]
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon +4 more
core +2 more sources
MITM: A new Mars Ionosphere−Thermosphere Model
In this study, we present an innovative Mars Ionosphere−Thermosphere Model (MITM), which is a time-dependent, three-dimensional (3-D) model that comprehensively represents the self-consistently coupled thermosphere and ionosphere of Mars within the ...
ZhiPeng Ren +4 more
doaj +2 more sources
Bluetooth pairing establishes trust on first use between two devices by creating a shared key. Similar to certificate warnings in TLS, the Bluetooth specification requires warning users upon issues with this key, because this can indicate ongoing Machine-in-the-Middle (MitM) attacks.
Classen, Jiska, Hollick, Matthias
openaire +2 more sources
Impact of prenatal phthalate exposure on newborn metabolome and infant neurodevelopment [PDF]
We evaluated associations among exposure to prenatal phthalate metabolites, perturbations of the newborn metabolome, and infant neurobehavioral functioning in mother-newborn pairs enrolled in the Atlanta African American Maternal-Child Cohort during 2016–
Susan S. Hoffman +18 more
doaj +2 more sources
Potential Security Issues in Implementing IaaS and PaaS Cloud Service Models
As the digital world evolves, so does potential problem that computer users encounter. Cybersecurity threats are still evolving and expanding. Unfortunately, most computer users do not understand this properly.
Wishnu Kusumo Agung Erlangga +1 more
doaj +1 more source
Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj +1 more source
Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency
As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference.
Yaoqi Yang +5 more
doaj +1 more source
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma +4 more
core +3 more sources
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +1 more source

