Man-in-the-middle attack

Results: 286



#Item
11SPV: Secure Path Vector Routing for Securing BGP  ∗ Yih-Chun Hu Adrian Perrig

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
12Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
13Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
14Decentralized	Public	Key	Infrastructure	 A	White	Paper	from	Rebooting	the	Web	of	Trust	 by	(alphabetical	by	last	name)	Christopher	Allen,	Arthur	Brock,	Vitalik	Buterin,	Jon Callas,	Duke	Dorje,	Christian	Lundkvist,	Pavel

Decentralized Public Key Infrastructure A White Paper from Rebooting the Web of Trust by (alphabetical by last name) Christopher Allen, Arthur Brock, Vitalik Buterin, Jon Callas, Duke Dorje, Christian Lundkvist, Pavel

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
15Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity Lachlan J. Gunn, Andrew Allison, Derek Abbott arXiv:1602.03316v1 [cs.CR] 10 Feb 2016

Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity Lachlan J. Gunn, Andrew Allison, Derek Abbott arXiv:1602.03316v1 [cs.CR] 10 Feb 2016

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-02-10 20:40:16
16Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
17WhatsApp Encryption Overview Technical white paper April 4, 2016

WhatsApp Encryption Overview Technical white paper April 4, 2016

Add to Reading List

Source URL: www.whatsapp.com

Language: English
18Sub-Prime PKI: Attacking Extended Validation SSL for Black Hat USA 2009

Sub-Prime PKI: Attacking Extended Validation SSL for Black Hat USA 2009

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
19Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05
20Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis , Tor Tech ReportMarch 17, 2012

Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis , Tor Tech ReportMarch 17, 2012

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-26 02:02:15