Man-in-the-middle attack

Results: 286



#Item
51Certificate authority / Peer-to-peer / Revocation list / Man-in-the-middle attack / Public key certificate / Public key infrastructure / Trusted Computing Group / Trusted Computing / Trusted Execution Technology / Cryptography / Public-key cryptography / Key management

Int. J. Inf. SecurDOIs10207x S P E C I A L I S S U E PA P E R Gabriel Vanrenen · Sean Smith · John Marchesini

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:23:27
52Electronic commerce / Cryptographic protocols / SAS / Digital signature / Public key certificate / X.509 / Man-in-the-middle attack / Certificate authority / RSA / Cryptography / Public-key cryptography / Key management

Experimenting with Server-Aided Signatures Xuhua Ding, Daniele Mazzocchi, Gene Tsudik Information and Computer Science Department University of California, Irvine {xhding,dmazzocc,gts}@ics.uci.edu

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:20:50
53Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
54Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
55Distributed data storage / Cryptographic hash function / Wireless sensor network / Denial-of-service attack / Man-in-the-middle attack / Onion routing / Cryptography / Public-key cryptography / Message authentication code

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
56Email / Electronic documents / Man-in-the-middle attack / Trusted third party / Alice and Bob / Simple Mail Transfer Protocol / Digital signature / Needham–Schroeder protocol / Cryptography / Public-key cryptography / Cryptographic protocols

TRICERT: A Distributed Certified E-Mail Scheme Giuseppe Ateniese Breno de Medeiros Michael T. Goodrich

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:08:05
57Cryptographic protocols / Secure communication / One-time password / Malware / Man-in-the-middle attack / Transport Layer Security / Email / Password / Phishing / Internet / Computing / Security

PDF Document

Add to Reading List

Source URL: www.roywant.com

Language: English - Date: 2008-04-16 16:52:00
58Cyberwarfare / Technology / Wireless security / Wi-Fi Protected Access / Session hijacking / IEEE 802.11 / Wi-Fi / Man-in-the-middle attack / Wireless access point / Computer network security / Wireless networking / Computing

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:27
59Internet protocols / Electronic commerce / Cryptographic protocols / Transport Layer Security / HTTP Secure / CA/Browser Forum / Extended Validation Certificate / Man-in-the-middle attack / Public key certificate / Cryptography / Secure communication / Key management

PDF Document

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-28 00:11:30
60Access control list / Conj / Man-in-the-middle attack / Public-key cryptography / Mathematical proof / Communications protocol / Data / Information / Mathematics

Confidentiality-Preserving Distributed Proofs of Conjunctive Queries Adam J. Lee† Kazuhiro Minami‡

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:19
UPDATE