Man-in-the-middle attack

Results: 286



#Item
61Medical device / Man-in-the-middle attack / Network security / Technology / Wireless / Bluetooth

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2013-01-14 17:59:22
62Password / Authentication / Man-in-the-middle attack / Strong authentication / Cryptographic protocols / Two-factor authentication / Anakam / Cryptography / Security / Computer security

Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:12:00
63Cryptographic protocols / Notary / Digital signature / Public key certificate / Key / Authentication / Man-in-the-middle attack / MIKEY / Cryptography / Public-key cryptography / Key management

PROTOCOLS FOR PUBUC KEY CRYPTOSYSTEMS Ralph C. Merkle ELXSi International ......

Add to Reading List

Source URL: www.merkle.com

Language: English - Date: 2010-07-19 01:52:15
64Travel behavior / Trip distribution / Transport / Trip generation / Mode choice / Walking / Public transport / Transportation planning / Technology / Man-in-the-middle attack

Expert Evidence Report Ballan Road and Westbrook PSPs Prepared by Fotios Spiridonos – Innovative Transport Strategies Pty Ltd

Add to Reading List

Source URL: www.bicyclenetwork.com.au

Language: English - Date: 2014-04-23 01:05:36
65Internet protocols / Password / Challenge-response authentication / Inter-Asterisk eXchange / MD5 / Replay attack / Man-in-the-middle attack / Computer network security / Cryptographic hash functions / Computer security / Cryptography / Cyberwarfare

iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
66Internet / Cryptographic protocols / Secure communication / Internet privacy / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Cyberwarfare

INTERNET STANDARDS AND WEB SECURITY Jeff Hodges PayPal August 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-08-23 16:12:20
67Public key certificate / Certificate authority / HTTP Secure / Self-signed certificate / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

CIS 331 Introduction to Networks & Security April 16, 2014 Homework 4: Exam Review

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
68HTTP / Inter-process communication / Server Message Block / URL redirection / DNS spoofing / Shared resource / Man-in-the-middle attack / HTTP Secure / Computing / Network file systems / Computer network security

REDIRECT TO SMB REDIRECT TO SMB A CYLANCE SPEAR TEAM WHITE PAPER Lead Researcher: Brian Wallace // @botnet_hunter

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-04-13 03:55:39
69Computing / HTTP / Secure communication / Computer network security / Phishing / Spamming / Password / Man-in-the-middle attack / HTTP Secure / Cryptographic protocols / Cryptography / Security

The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija J.D. Tygar

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
70Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Public-key cryptography / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE