Man-in-the-middle attack

Results: 286



#Item
11Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
12Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
13Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
14Cryptography / Public-key cryptography / Cryptocurrencies / Key management / Bitcoin / Transport Layer Security / Blockchain / X.509 / Key / Ethereum / Man-in-the-middle attack / Unique key

Decentralized Public Key Infrastructure A White Paper from Rebooting the Web of Trust by (alphabetical by last name) Christopher Allen, Arthur Brock, Vitalik Buterin, Jon Callas, Duke Dorje, Christian Lundkvist, Pavel

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
15Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Secure communication / Key server / Man-in-the-middle attack / Public key certificate / Certificate authority / Anonymity / HTTPS

Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity Lachlan J. Gunn, Andrew Allison, Derek Abbott arXiv:1602.03316v1 [cs.CR] 10 Feb 2016

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-02-10 20:40:16
16Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
17Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

WhatsApp Encryption Overview Technical white paper April 4, 2016

Add to Reading List

Source URL: www.whatsapp.com

Language: English
18Transport Layer Security / Key management / Public key infrastructure / E-commerce / Hypertext Transfer Protocol / HTTPS / Man-in-the-middle attack / Extended Validation Certificate / Certificate authority / Phishing / Moxie Marlinspike / Public key certificate

Sub-Prime PKI: Attacking Extended Validation SSL for Black Hat USA 2009

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
19Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05
20Computer network security / Deep packet inspection / Transmission Control Protocol / Man-in-the-middle attack

Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis , Tor Tech ReportMarch 17, 2012

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-26 02:02:15
UPDATE