Results 181 to 190 of about 8,344 (213)
Some of the next articles are maybe not open access.
Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
2013This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we here look for the existence
Canteaut, Anne +2 more
openaire +1 more source
FIREWALL AS THE FIRST LINE OF DEFENSE AGAINST MITM ATTACKS
FBIM TransactionsThe network firewall represents the first line of defense against Man-in-the-Middle (MitM) attacks, which threaten the confidentiality, integrity, and authenticity of digital communications. This paper offers a systematic classification of core MitM techniques—ranging from ARP poisoning and DNS spoofing to HTTPS degradation (SSL stripping) and session ...
openaire +1 more source
MiTM Attack Detection Scheme Using Monitoring Information in V2X Communication
2023 9th International Conference on Computer and Communications (ICCC), 2023Wonjin Chung, Jungsub Ahn, Taeho Cho
openaire +1 more source
Secure Certificateless Authenticated Key Agreement Protocol Against MITM Attack
The Journal of Korean Institute of Communications and Information Sciences, 2018Jin-Hyun Park, Soon-Ja Kim
openaire +1 more source
A novel Evil Twin MiTM attack through 802.11v protocol exploitation
Computers & Security, 2023Constantinos Louca +2 more
openaire +1 more source
MITM and Differential Fault Attack on ULBC
2024 Asian Conference on Communication and Networks (ASIANComNet)Shreyasi Ghorai, Mrinal Nandi
openaire +1 more source
Multidisciplinary standards of care and recent progress in pancreatic ductal adenocarcinoma
Ca-A Cancer Journal for Clinicians, 2020Aaron J Grossberg +2 more
exaly
Oral complications of cancer and cancer therapy
Ca-A Cancer Journal for Clinicians, 2012Joel B Epstein +2 more
exaly

