Man-in-the-middle attack

Results: 286



#Item
201Certificate authorities / Electronic commerce / DigiCert / Cryptographic protocols / Extended Validation Certificate / Phishing / X.509 / Public key certificate / Man-in-the-middle attack / Cryptography / Key management / Public-key cryptography

[removed]This Issue What’s New P.1 Product Highlight P.1

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-09-29 16:25:36
202Cloud computing / Man-in-the-middle attack / Key management / Public-key cryptography / Software as a service / Cryptographic protocol / Novell Cloud Security Service / IICCRD / Computing / Centralized computing / Cryptography

Securely Managing Cryptographic Keys used within a Cloud Environment Dr. Sarbari Gupta [removed[removed]ext 12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:10:00
203Cryptographic protocols / Secure communication / Electronic commerce / Public key certificate / HTTP Secure / Transport Layer Security / Certificate authority / X.509 / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Rethinking SSL Development in an Appified World Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith Distributed Computing & Security Group Leibniz University Hannover, Germany Hannover, Germany

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-08 16:26:27
204Computing / Password / SPEKE / Zero-knowledge password proof / Knowledge-based authentication / Passwd / Man-in-the-middle attack / Shadow password / Transport Layer Security / Cryptographic protocols / Cryptography / Security

Methods for Knowledge-Based Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
205Secure Shell / Email encryption / Encryption / Cipher / Deniable encryption / Cryptography / Public-key cryptography / Man-in-the-middle attack

Introduction to Securing Data in Transit Jennifer Vesperman [removed] 2002−02−24 Revision History

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2002-03-20 10:51:36
206Computer network security / HTTP / Security / Internet / Password / Man-in-the-middle attack / HTTP Secure / Wi-Fi / Transport Layer Security / Cryptographic protocols / Secure communication / Computing

CALIFORNIA STATE SCIENCE FAIR 2014 PROJECT SUMMARY Name(s) Manaal A. Sayed

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2014-04-25 17:11:40
207Man-in-the-middle attack / Public-key cryptography / DCF Interframe Space / Network packet / Transmission Control Protocol / Computing / Information / Technology / IEEE 802.11 / Bluetooth

Secure In-Band Wireless Pairing Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, and Dina Katabi Massachusetts Institute of Technology A BSTRACT Alliance does not fully address WiFi security. DiffieHellman’s key

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
208Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
209Quantum cryptography / Quantum field theory / Quantum mechanics / Superselection / Commitment scheme / Quantum key distribution / Qubit / Alice and Bob / Man-in-the-middle attack / Physics / Cryptography / Quantum information science

Quantum information and quantum mechanics: fundamental issues John Preskill, Caltech 23 February 2004

Add to Reading List

Source URL: www.theory.caltech.edu

Language: English - Date: 2004-11-03 21:17:40
210Man-in-the-middle attack / Key / Public-key cryptography / Passphrase / Password strength / OTPW / Cryptography / Key management / Password

Using Voice to Generate Cryptographic Keys Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel Bell Labs, Lucent Technologies Murray Hill, NJ, USA Abstract In this position paper, we motivate and summarize our

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35
UPDATE