Results 21 to 30 of about 13,174 (191)

Iron-based metal-organic framework co-loaded with buthionine sulfoximine and oxaliplatin for enhanced cancer chemo-ferrotherapy via sustainable glutathione elimination

open access: yesJournal of Nanobiotechnology, 2023
Background Emerging ferroptosis-driven therapies based on nanotechnology function either by increasing intracellular iron level or suppressing glutathione peroxidase 4 (GPX4) activity.
Zhiping Rao   +12 more
doaj   +1 more source

Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as
Hartina Hiromi Satyanegara   +1 more
doaj   +1 more source

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing

open access: yesIEEE Access, 2022
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communication between two ...
Sabah M. Morsy, Dalia Nashat
doaj   +1 more source

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm

open access: yesIEEE Access, 2020
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj   +1 more source

Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology, 2023
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang   +3 more
doaj   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

On the security of SSL/TLS-enabled applications

open access: yesApplied Computing and Informatics, 2014
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality.
Manik Lal Das, Navkar Samdaria
doaj   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

Understanding Man-in-the-middle-attack through Survey of Literature

open access: yesIndonesian Journal of Computing, Engineering and Design, 2019
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped
A. Mallik   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy