Man-in-the-middle attack

Results: 286



#Item
31Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / HTTP Secure / Extended Validation Certificate / Public key certificate / Certificate authority / Man-in-the-middle attack / Cryptography / Key management / Public-key cryptography

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:17:52
32Electronic commerce / Cryptographic protocols / Ciphertext / Key / Password / Malware / Man-in-the-middle attack / RSA / Key encapsulation / Cryptography / Public-key cryptography / Key management

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-04-03 00:22:05
33Key management / Online chat / Man-in-the-middle attack / Public-key cryptography / Secure messaging / ID-based encryption / Secure communication / Email encryption / ZRTP / Cryptography / Cryptographic protocols / Internet privacy

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2015-04-11 10:28:11
34Man-in-the-middle attack / Mini / Transport / Private transport / British brands

JuneHappy June, MINI5280! IN THIS ISSUE New Members

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2013-09-20 06:52:04
35Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Cryptographic hash function / Public key fingerprint / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2015-04-10 15:07:29
36Automotive industry by country / Mini / Man-in-the-middle attack / Transport / Private transport / British brands

PDF Document

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2014-03-30 21:01:49
37Hatchbacks / Battery electric vehicles / Convertibles / Boy Scouts of America / Mini / Man-in-the-middle attack / Pinewood derby / Transport / Private transport / British brands

SeptemberMINI Greetings, MINI5280! IN THIS ISSUE

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2013-09-20 06:52:27
38Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
39Hatchbacks / Battery electric vehicles / Convertibles / Mini / Man-in-the-middle attack / Top Gear / Transport / Private transport / British brands

JulyHappy July, MINI5280! With this warm weather comes lots of new MINI events and recollections of those recently passed. Just last month some

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2013-09-20 06:52:15
40Cryptography / Quantum information science / Man-in-the-middle attack / Quantum computer / Quantum key distribution / Noisy-storage model / Quantum cryptography / Theoretical computer science / Applied mathematics

Relativistic quantum cryptography Jed Kaniewski Centre for Quantum Technologies, NUS QuTech, TU Delft 23 March 2015

Add to Reading List

Source URL: www.pcqc.fr

Language: English - Date: 2015-03-25 23:25:36
UPDATE