Man-in-the-middle attack

Results: 286



#Item
71DigiNotar / Certificate authority / Extended Validation Certificate / CAcert.org / HTTP Secure / Transport Layer Security / Comodo Group / Public key certificate / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Kai Engert https://kuix.de

Add to Reading List

Source URL: kuix.de

Language: English - Date: 2012-02-06 06:51:49
72Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
73Computing / Password authentication protocol / Transmission Control Protocol / Public-key cryptography / Authentication / Denial-of-service attack / Message authentication code / Wireless sensor network / Man-in-the-middle attack / Cryptography / Computer network security / Cyberwarfare

Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
74Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
75Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
76Authentication / Biometrics / Man-in-the-middle attack / Security / Cryptography / Password

Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards Jian-Zhu Lu? , Shaoyuan Zhang, and Shijie Qie Department of Computer Science, Jinan University, Guangzhou, Guangdong, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-13 05:22:49
77Electronic commerce / Secure communication / Internet standards / CA/Browser Forum / Certificate authority / Public key certificate / X.509 / Certificate policy / Man-in-the-middle attack / Cryptography / Key management / Public-key cryptography

WEBTRUST® FOR CERTIFICATION AUTHORITIES – SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 BASED ON:

Add to Reading List

Source URL: www.webtrust.org

Language: English - Date: 2014-11-17 04:59:56
78Computing / Domain Name System Security Extensions / DNS spoofing / Name server / Domain name registrar / Man-in-the-middle attack / Domain registration / OpenDNS / Domain name / Domain name system / Internet / Network architecture

Performance analysis of OFDM modulation on indoor broadband PLC channels

Add to Reading List

Source URL: jis.eurasipjournals.com

Language: English
79Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
80Data security / Internet privacy / Key escrow / Key / Information security / Secure communication / Clipper chip / Man-in-the-middle attack / Disk encryption / Cryptography / Key management / Public-key cryptography

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2013-04-29 10:36:57
UPDATE