Man-in-the-middle attack

Results: 286



#Item
231Internet protocols / Network architecture / Tor / Man-in-the-middle attack / Secure Shell / Anonymizer / File Transfer Protocol / Relay / Proxy server / Internet / Computing / Internet privacy

Spoiled Onions: Exposing Malicious Tor Exit Relays∗ Philipp Winter1 , Richard Köwer3 , Martin Mulazzani2 , Markus Huber2 , Sebastian Schrittwieser2 , Stefan Lindskog1 , and Edgar Weippl2 1

Add to Reading List

Source URL: petsymposium.org

Language: English - Date: 2014-06-27 07:04:35
232Certificate authorities / Cryptographic protocols / Electronic commerce / Comodo Group / Transport Layer Security / Public key certificate / X.509 / Verisign / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:24
233FIPS 140-2 / FIPS 140 / Critical Security Parameter / Zeroisation / Man-in-the-middle attack / Cryptography / Cryptography standards / Computer security

Non-Proprietary Security Policy for AirFortress™ Secure Client Cryptographic Module Fortress Technologies, Inc., 4025 Tampa Rd., Suite 1111, Oldsmar, FL[removed]Page 1 of 14 Non-Proprietary Security Policy for AirFortres

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
234Internet / Cross-site scripting / Proxy server / JavaScript / HTTP cookie / Pharming / Tor / Man-in-the-middle attack / Password / Computing / Internet privacy / Computer security

Practice & Prevention of Home-Router Mid-Stream Injection Attacks Steven Myers Sid Stamm

Add to Reading List

Source URL: research.sidstamm.com

Language: English - Date: 2011-04-08 12:07:54
235Comodo Group / Certificate authority / Public key certificate / Public key infrastructure / X.509 / Man-in-the-middle attack / Code signing / Root certificate / Comparison of SSL certificates for web servers / Cryptography / Key management / Public-key cryptography

Centrally Managing Trust, Security & Compliance in Educational Institutions Public Key Infrastructure (PKI) CASE STUDY: Education SSL Certificate Management Too many SSLCertificates, Not EnoughTime Large, thriving enterp

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
236Internet / S/MIME / Outlook Express / MIME / Secure messaging / Hotmail / Public-key cryptography / Man-in-the-middle attack / IBM Lotus Notes / Email / Computing / Computer-mediated communication

Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express Simson L. Garfinkel Robert C. Miller

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2005-07-13 08:30:04
237Cryptographic software / System software / OpenSSL / Computing / Secure Shell / HTTP Secure / Man-in-the-middle attack / Debian / Software / Cryptographic protocols / Secure communication

Innominate AG ! Rudower Chaussee 13 ! 12489 Berlin Rudower Chaussee[removed]Berlin T +[removed]F +[removed]

Add to Reading List

Source URL: www.innominate.com

Language: English - Date: 2014-04-11 11:02:54
238Applied mathematics / Decoy state / Quantum key distribution / ETSI Satellite Digital Radio / Information-theoretic security / Man-in-the-middle attack / European Telecommunications Standards Institute / Security parameter / Cryptographic protocol / Quantum cryptography / Cryptography / Quantum information science

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security Proofs

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-12-09 09:45:52
239Cryptographic protocols / Key management / Secure Communication based on Quantum Cryptography / Quantum key distribution / Cryptographic primitive / Public-key cryptography / Symmetric-key algorithm / Man-in-the-middle attack / Key size / Cryptography / Quantum cryptography / Quantum information science

New Journal of Physics The open–access journal for physics Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger1 and Gaby Lenhart2

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2009-05-28 06:20:00
240JavaScript / World Wide Web / Man-in-the-middle attack / Malware / Form / Password / Cross-site request forgery / Computing / Software / Cross-platform software

HProxy: Client-side detection of SSL stripping attacks Nick Nikiforakis, Yves Younan, and Wouter Joosen IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:07:10
UPDATE