Results 41 to 50 of about 13,174 (191)
Build It, Break It, Fix It: Contesting Secure Development
Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to assess the ability to securely build software not just break it.
Hicks, Michael +5 more
core +1 more source
MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain +2 more
doaj +1 more source
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source
A Fault Analytic Method against HB+ [PDF]
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family.
Carrijo, Jose +2 more
core +2 more sources
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
New attacks against reduced Rijndael‐160
The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using the generalised δ‐set and ...
Xiaoli Dong, Yongzhuang Wei
doaj +1 more source
Mosquito‐borne diseases are increasing globally, driven by the expanding range of invasive vectors, yet the mechanisms of their spread remain poorly understood. Using 20 years of invasion data from Spain, we combine high‐resolution human mobility data with a metapopulation model to study the colonisation dynamics of Aedes albopictus.
Marta Pardo‐Araujo +3 more
wiley +1 more source
DSTC: DNS-based Strict TLS Configurations
Most TLS clients such as modern web browsers enforce coarse-grained TLS security configurations. They support legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g.
AJ Menezes +3 more
core +1 more source
ABSTRACT The use of gender‐inclusive language (GIL) in German is frequently examined in linguistics and related fields. While journalistic texts are often the central element of such analyses, research on the actual language users – the journalists – and their complex linguistic practices behind the scenes is rather scarce.
Sarah Josefine Schaefer
wiley +1 more source

