Man-in-the-middle attack

Results: 286



#Item
21Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
22Cryptography / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Wireless / Secure communication / Man-in-the-middle attack / Bluetooth / Key-agreement protocol / HTTPS / Password / Transmission Control Protocol

PDF Document

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
23Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
24Cyberwarfare / Internet privacy / Cryptographic protocols / Secure communication / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Internet

Web (In)Security: Remediation Efforts Status and Outlook Jeff Hodges Andy Steingruebl PayPal

Add to Reading List

Source URL: kingsmountain.com

Language: English - Date: 2011-02-22 23:56:14
25HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
26Payment systems / Smart cards / Computer security / Phishing / Spamming / Transaction authentication number / Chip Authentication Program / Password / Man-in-the-middle attack / Computing / Cybercrime / Social engineering

Optimised to Fail: Card Readers for Online Banking Saar Drimer Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-02-23 14:32:52
27Network Driver Interface Specification / WinDbg / Man-in-the-middle attack / Strace / Debugger / Software / GTK+ / Wireshark

Windbgshark: the unified traffic instrumentation tool [1,2,3] 1. Virtualized 2. For Windows 3. For vulnerability researchers and reverse engineers

Add to Reading List

Source URL: 2011.zeronights.org

Language: English - Date: 2011-12-28 02:02:48
28

Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling Jethro Beekman Christopher Thompson Electrical Engineering and Computer Sciences

Add to Reading List

Source URL: www.eecs.berkeley.edu

- Date: 2013-03-19 04:57:05
    29

    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: , p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PPwww.iosrjournals.org Identifying Threats Associated With Man-In-The-Middle Attack

    Add to Reading List

    Source URL: www.jkuat.ac.ke

    Language: English - Date: 2015-03-05 14:33:31
      30Computing / Domain Name System Security Extensions / DNS spoofing / Name server / Google Public DNS / Man-in-the-middle attack / PowerDNS / Anycast / CNAME record / Internet / Domain name system / Network architecture

      2014 IEEE Security and Privacy Workshops Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-30 03:11:51
      UPDATE