Replay attack

Results: 25



#Item
1

Targeted Attack Replay Guide A guide to recreating targeted attacks launched during attack testing Ref: [v.1.0]

Add to Reading List

Source URL: selabs.uk

Language: English
    2

    Replay Attack in TCG Specification and Solution Danilo Bruschi Lorenzo Cavallaro Andrea Lanzi Mattia Monga

    Add to Reading List

    Source URL: www.iseclab.org

    Language: English
      3Replay attack / Mallory / Alice and Bob / Adversary / Auguste Kerckhoffs / RSA / Cryptography / Cryptographic protocols / Public-key cryptography

      Microsoft PowerPointw11-Crypto_Notes.pptm

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2013-01-17 13:05:35
      4

      Stochastic Game Approach for Replay Attack Detection Fei Miao Miroslav Pajic Abstract— The existing tradeoff between control system

      Add to Reading List

      Source URL: www.seas.upenn.edu

      - Date: 2013-09-15 17:49:52
        5

        Poster: Power Replay Attack in Electronic Door Locks Seongyeol Oh, Joon-sung Yang, Andrea Bianchi, Hyoungshick Kim College of Information and Communication Engineering Sungkyunkwan University Suwon, Republic of Korea

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2014-05-07 16:20:29
          6Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

          On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

          Add to Reading List

          Source URL: www.cypherpunks.ca

          Language: English - Date: 2009-11-13 20:20:01
          7Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

          Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2006-08-23 11:43:55
          8Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

          Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

          Add to Reading List

          Source URL: www.isoc.org

          Language: English - Date: 2001-07-20 00:20:35
          9Virtual machines / Programming language implementation / Replication / Hyper-V / Oracle Database / Hypervisor / Operating system / VM / Windows / Software / System software / Cross-platform software

          ExecRecorder: VM-Based Full-System Replay for Attack Analysis and System Recovery Daniela A. S. de Oliveira S. Felix Wu Jedidiah R. Crandall

          Add to Reading List

          Source URL: seclab.cs.ucdavis.edu

          Language: English - Date: 2007-02-21 19:48:12
          10Internet protocols / Password / Challenge-response authentication / Inter-Asterisk eXchange / MD5 / Replay attack / Man-in-the-middle attack / Computer network security / Cryptographic hash functions / Computer security / Cryptography / Cyberwarfare

          iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

          Add to Reading List

          Source URL: www.blackhat.com

          Language: English - Date: 2014-12-16 19:06:37
          UPDATE