Results 121 to 130 of about 1,025 (182)

Cecoin: A decentralized PKI mitigating MitM attacks

Future Generation Computer Systems, 2020
Abstract For numerous applications, it is essential to reliably link a public key with its owner. The current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a trusted certificate authority (CA), to fulfill this assignment by signing the certificate for the public key after validating its owner.
Bo Qin   +5 more
openaire   +1 more source

The Password Reset MitM Attack

2017 IEEE Symposium on Security and Privacy (SP), 2017
We present the password reset MitM (PRMitM) attack and show how it can be used to take over user accounts. The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level.
Nethanel Gelernter   +3 more
openaire   +1 more source

Pilot Contamination with MITM Attack

2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017
Existing studies on the secret key generation based on physical layer wireless fading channel are largely open under active attacks. In this paper, we discuss how the man-in-the- middle (MITM) attacker, who acts as a transparent relay, attacks the training phase in wireless communication to improve the information leaked rate.
Yu Huang   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy