Man-in-the-middle attack

Results: 286



#Item
251Internet standards / Internet protocols / Key management / Transport Layer Security / Certificate authority / X.509 / Man-in-the-middle attack / DigiNotar / Domain Name System Security Extensions / Cryptography / Public-key cryptography / Cryptographic protocols

Firm Grip Handshakes: a Tool for Bidirectional Vouching Omer Berkman∗ Benny Pinkas†

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-02-01 08:45:46
252Electronic commerce / Cryptographic protocols / Digital signature / SAS / Public key certificate / X.509 / Man-in-the-middle attack / Certificate authority / S/MIME / Cryptography / Public-key cryptography / Key management

Experimenting with Server-Aided Signatures Xuhua Ding, Daniele Mazzocchi and Gene Tsudik Information and Computer Science Department University of California, Irvine {xhding,dmazzocc,gts}@ics.uci.edu November 13, 2001

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2003-11-16 21:31:42
253Internet / Public-key cryptography / Internet privacy / Computer networking / Network performance / Proxy server / Man-in-the-middle attack / Keystore / HTTP Secure / Cryptography / Computing / Cryptographic protocols

CS255: Introduction to Cryptography Winter 2013 Programming Project #2 Due: Friday, March 15th, 2013, 11:59 pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-03-01 13:40:09
254Key management / Cryptographic protocols / HTTP / Secure communication / HTTP Secure / Transport Layer Security / Man-in-the-middle attack / Public key certificate / Phishing / Cryptography / Computing / Public-key cryptography

Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith Lars Baumgärtner, Bernd Freisleben

Add to Reading List

Source URL: www2.dcsec.uni-hannover.de

Language: English - Date: 2012-10-19 20:37:54
255Computer networking / Network performance / Internet privacy / Cryptographic protocols / Secure communication / Proxy server / Man-in-the-middle attack / HTTP Secure / Keystore / Computing / Internet / Cryptography

CS255: Introduction to Cryptography Winter 2012 Programming Project #2 Due: Friday, March 9th, 2012, 11:59 pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-03-23 13:12:38
256Computer networking / Network performance / Internet privacy / Cryptographic protocols / Secure communication / Proxy server / Man-in-the-middle attack / HTTP Secure / Keystore / Computing / Internet / Cryptography

CS255: Introduction to Cryptography Winter 2010

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-02-26 21:17:11
257Secure communication / Computer networking / Network performance / Internet privacy / Cryptographic protocols / Proxy server / Man-in-the-middle attack / HTTP Secure / Keystore / Computing / Internet / Cryptography

CS255: Introduction to Cryptography Winter 2010

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2011-02-19 00:12:51
258Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
259Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
260Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:02
UPDATE