Man-in-the-middle attack

Results: 286



#Item
241Password-authenticated key agreement / SPEKE / Password / Key-agreement protocol / Diffie–Hellman key exchange / Encrypted key exchange / Man-in-the-middle attack / Public-key cryptography / Salt / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

J-PAKE: Authenticated Key Exchange without PKI Feng Hao1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-12-17 06:46:52
242Password-authenticated key agreement / Electronic commerce / Password / Two-factor authentication / Man-in-the-middle attack / Biometrics / Security token / RSA / Authentication / Cryptography / Security / Cryptographic protocols

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2012-01-30 18:16:54
243Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Man-in-the-middle attack / XTR / IEEE P1363 / Public-key cryptography / Interlock protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / SPEKE

Cryptanalysis of the Dragony Key Exchange Protocol Dylan Clarke, Feng Hao ∗

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-06-26 17:27:57
244Password-authenticated key agreement / SPEKE / Diffie–Hellman key exchange / Key-agreement protocol / Password / Encrypted key exchange / Public-key cryptography / Man-in-the-middle attack / GEC / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

Password Authenticated Key Exchange by Juggling Feng Hao⋆1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-30 07:42:46
245Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

Add to Reading List

Source URL: otr.cypherpunks.ca

Language: English - Date: 2013-09-28 15:30:06
246Computing / Network architecture / Cryptographic protocols / Internet protocol suite / Haifa / TCP/IP stack fingerprinting / Link layer / Transmission Control Protocol / Man-in-the-middle attack / Internet / Internet standards

MiTM Attack - Haifa-Sec MiTM Attack Edri Guy May 29 ,2013

Add to Reading List

Source URL: august.penguin.org.il

Language: English - Date: 2014-05-31 10:33:40
247Man-in-the-middle attack / Bhubaneswar / Indian Railways / States and territories of India / Rail transport in India

-[removed]195580MODERN INSTITUTE OF TECHNOLOGY & MANAGEMENT BHUBANESWAR[removed]NOTICE MITM/EXAM/209 Dated : [removed]

Add to Reading List

Source URL: mitm.in

Language: English - Date: 2014-05-19 03:46:44
248Education in Rourkela / Biju Patnaik University of Technology / Sundargarh district / Deposit account / Man-in-the-middle attack / All India Council for Technical Education / States and territories of India / Education in Orissa / Orissa

-[removed]MODERN INSTITUTE OF TECHNOLOGY & MANAGEMENT BHUBANESWAR NOTICE Ref No:MITM/EXAM/314 [removed]Dt[removed]

Add to Reading List

Source URL: mitm.in

Language: English - Date: 2014-06-18 01:28:23
249Man-in-the-middle attack / Key exchange / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Security Issues in a CDPD Wireless Network by Yair Frankel, et. al. Summarized by Johnathan M. Reason CS294-7 Lecture Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: bnrg.eecs.berkeley.edu

Language: English - Date: 1996-04-16 10:49:00
250Electronic documents / Key management / Man-in-the-middle attack / Communications protocol / Digital signature / Trusted third party / Certified email / Public key infrastructure / Return receipt / Cryptography / Email / Public-key cryptography

Certified Email with a Light On-line Trusted Third Party: Design and Implementation ∗ Mart´ın Abadi

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2003-01-11 00:09:21
UPDATE