Results 41 to 50 of about 1,025 (182)

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Intrusion detection in IoT networks using machine learning and deep learning approaches for MitM attack mitigation

open access: yesDiscover Internet of Things
The Internet of Things (IoT) revolutionizes connectivity but introduces significant security challenges, particularly concerning man-in-the-middle (MitM) attacks.
Muhanna Ahmed Ali   +1 more
doaj   +1 more source

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

The development of countermeasures against session hijacking [PDF]

open access: yesE3S Web of Conferences
This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and sites much vulnerability, which developers often do not pay attention to, are occurred. The paper
Cherckesova Larissa   +3 more
doaj   +1 more source

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity

open access: yesInformation, 2014
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic.
Won Min Kang   +2 more
doaj   +1 more source

Preventing Man-in-The-Middle (MiTM) Attack of GSM Calls

open access: yesEuropean Journal of Electrical Engineering and Computer Science, 2021
Preventing man-in-the-middle (MiTM) attack using Artificial Neural Network refers to an in depth analysis of how calls are made vis-a-viz the structure of the inter-related operations that binds the respective subsystems within the GSM Architecture during calls. Calls in the GSM network is a request from aMobile Station (MS).
B. I. Bakare, S. M. Ekolama
openaire   +2 more sources

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Advanced protocol against MITM attacks in Industrial Control System

open access: yesJournal of the Korea Institute of Information Security and Cryptology, 2015
If the industrial control system is infected by malicious worm such as Stuxnet, national disaster could be caused inevitably. Therefore, most of the industrial control system defence is focused on intrusion detection in network to protect against these threats.
Moo-seong Ko, Sang-kyo Oh, Kyung-ho Lee
openaire   +2 more sources

Home - About - Disclaimer - Privacy