Man-in-the-middle attack

Results: 286



#Item
1Computer network security / Computing / Security / Cyberwarfare / Bluetooth / Wireless / Medical device / Computer security / Man-in-the-middle attack / Bluesnarfing / Mobile security

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2012-09-17 16:56:34
2Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
3Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
4Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Language: English - Date: 2011-01-17 04:39:11
5Cryptography / Computing / Transport Layer Security / Key management / Public-key cryptography / Hypertext Transfer Protocol / Computer network security / HTTPS / Man-in-the-middle attack / Browser security / Public key certificate / Public key infrastructure

Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
6Cryptography / Public-key cryptography / Key management / Internet privacy / Transport Layer Security / Secure messaging / Threema / ID-based encryption / Man-in-the-middle attack / Email encryption / Key exchange / WhatsApp

2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 ∗ Nik Unger∗ , Sergej Dechand†

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:11
7Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Biometrics / Certificate authority / Man-in-the-middle attack / X.509 / Authentication / Key / Revocation list / Public key certificate

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
8Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Biometrics / Certificate authority / Man-in-the-middle attack / X.509 / Authentication / Key / Revocation list / Public key certificate

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
9Transport Layer Security / Computer network security / Internet privacy / Computer networking / Network performance / Proxy server / Certificate authority / World Wide Web / Password / Man-in-the-middle attack / Online banking

Internet Banking Some InternetAnalyzing DNS Incidents SSL and users

Add to Reading List

Source URL: www.rvs.uni-bielefeld.de

Language: English - Date: 2002-12-19 11:49:33
10Transport Layer Security / Public key infrastructure / Cryptographic protocols / Secure communication / Public-key cryptography / Cisco Systems / Key management / Volume license key / Spark / Man-in-the-middle attack / End-to-end encryption / Certificate authority

White Paper Cisco Spark Security and Privacy Version 1.0 (JuneCisco® Spark is a cloud collaboration platform that provides messaging, calling, and

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE