Results 1 to 10 of about 13,174 (191)

Improved MITM Cryptanalysis on Streebog

open access: yesIACR Transactions on Symmetric Cryptology, 2022
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua   +5 more
doaj   +2 more sources

Deep Random based Key Exchange protocol resisting unlimited MITM [PDF]

open access: yes, 2018
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon   +4 more
core   +2 more sources

MITM: A new Mars Ionosphere−Thermosphere Model

open access: yesEarth and Planetary Physics
In this study, we present an innovative Mars Ionosphere−Thermosphere Model (MITM), which is a time-dependent, three-dimensional (3-D) model that comprehensively represents the self-consistently coupled thermosphere and ionosphere of Mars within the ...
ZhiPeng Ren   +4 more
doaj   +2 more sources

Happy MitM [PDF]

open access: yesProceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021
Bluetooth pairing establishes trust on first use between two devices by creating a shared key. Similar to certificate warnings in TLS, the Bluetooth specification requires warning users upon issues with this key, because this can indicate ongoing Machine-in-the-Middle (MitM) attacks.
Classen, Jiska, Hollick, Matthias
openaire   +2 more sources

Impact of prenatal phthalate exposure on newborn metabolome and infant neurodevelopment [PDF]

open access: yesNature Communications
We evaluated associations among exposure to prenatal phthalate metabolites, perturbations of the newborn metabolome, and infant neurobehavioral functioning in mother-newborn pairs enrolled in the Atlanta African American Maternal-Child Cohort during 2016–
Susan S. Hoffman   +18 more
doaj   +2 more sources

Potential Security Issues in Implementing IaaS and PaaS Cloud Service Models

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2022
As the digital world evolves, so does potential problem that computer users encounter. Cybersecurity threats are still evolving and expanding. Unfortunately, most computer users do not understand this properly.
Wishnu Kusumo Agung Erlangga   +1 more
doaj   +1 more source

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency

open access: yesIEEE Access, 2020
As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference.
Yaoqi Yang   +5 more
doaj   +1 more source

MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]

open access: yes, 2020
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma   +4 more
core   +3 more sources

Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search

open access: yesIET Information Security, 2023
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +1 more source

Home - About - Disclaimer - Privacy