Man-in-the-middle attack

Results: 286



#Item
41Public-key cryptography / Key management / Man-in-the-middle attack / Secure messaging / Public key infrastructure / ZRTP / Secure communication / S/MIME / Digital signature / Cryptography / Cryptographic protocols / Internet privacy

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-04-14 13:29:35
42Technology / Mini / PayPal / Man-in-the-middle attack / Email / Transport / Private transport / British brands

OFFICIAL NEWSLETTER OF THE MOTORING SOCIETY OF THE ROCKY MOUNTAIN REGION MINI5280 MARCH 2011

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2011-12-03 09:38:13
43Network architecture / Computer network security / Address Resolution Protocol / ARP spoofing / Dynamic Host Configuration Protocol / DNS spoofing / DSniff / IP address / Man-in-the-middle attack / Internet standards / Internet / Computing

TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

Add to Reading List

Source URL: www.enck.org

Language: English
44Root certificate / Extended Validation Certificate / Certificate authority / X.509 / CA/Browser Forum / Public key certificate / Certificate policy / Man-in-the-middle attack / China Internet Network Information Center / Cryptography / Key management / Public-key cryptography

The MCS Incident and Its Consequences for CNNIC Outline 1. 2.

Add to Reading List

Source URL: blog.mozilla.org

Language: English - Date: 2015-04-20 14:40:41
45Secure Shell / Email encryption / Encryption / Cipher / Deniable encryption / Cryptography / Public-key cryptography / Man-in-the-middle attack

Introduction to Securing Data in Transit Jennifer Vesperman 2002−02−24 Revision History

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2002-03-20 10:51:36
46Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
47Social engineering / Internet protocols / One-time password / Two-factor authentication / Password / Phishing / Transaction authentication number / Authentication / Man-in-the-middle attack / Security / Computer security / Cryptography

CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-02-13 13:31:35
48Notary / Computer security / Man-in-the-middle attack / Secure Shell / Certificate authority / Notary public / Key authentication / Non-repudiation / Cryptography / Key management / Public-key cryptography

Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2008-05-29 17:15:02
49Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / HTTP Secure / Extended Validation Certificate / Public key certificate / Certificate authority / Man-in-the-middle attack / Cryptography / Key management / Public-key cryptography

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

Add to Reading List

Source URL: www.enck.org

Language: English
50Public-key cryptography / Internet privacy / Public key certificate / World Wide Web / Certificate authority / Online shopping / Man-in-the-middle attack / Phishing / HTTP Secure / Cryptography / Electronic commerce / Key management

ArticSoft Assurity products are low cost, simple to administer security solutions for web sites, files and applications

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2002-05-01 19:19:39
UPDATE