Man-in-the-middle attack

Results: 286



#Item
41SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-04-14 13:29:35
42OFFICIAL NEWSLETTER OF THE MOTORING SOCIETY OF THE ROCKY MOUNTAIN REGION  MINI5280 MARCH 2011

OFFICIAL NEWSLETTER OF THE MOTORING SOCIETY OF THE ROCKY MOUNTAIN REGION MINI5280 MARCH 2011

Add to Reading List

Source URL: mini5280.org

Language: English - Date: 2011-12-03 09:38:13
43TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

Add to Reading List

Source URL: www.enck.org

Language: English
44The MCS Incident and Its Consequences for CNNIC Outline 1.  2.

The MCS Incident and Its Consequences for CNNIC Outline 1. 2.

Add to Reading List

Source URL: blog.mozilla.org

Language: English - Date: 2015-04-20 14:40:41
45Introduction to Securing Data in Transit  Jennifer Vesperman  2002−02−24 Revision History

Introduction to Securing Data in Transit Jennifer Vesperman 2002−02−24 Revision History

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2002-03-20 10:51:36
46Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
47CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-02-13 13:31:35
48Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University  Abstract

Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2008-05-29 17:15:02
49An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

Add to Reading List

Source URL: www.enck.org

Language: English
50ArticSoft Assurity products are low cost, simple to administer security solutions for web sites, files and applications

ArticSoft Assurity products are low cost, simple to administer security solutions for web sites, files and applications

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2002-05-01 19:19:39