Man-in-the-middle attack

Results: 286



#Item
61Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2013-01-14 17:59:22
62Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:12:00
63PROTOCOLS FOR PUBUC KEY CRYPTOSYSTEMS  Ralph C. Merkle ELXSi International ......

PROTOCOLS FOR PUBUC KEY CRYPTOSYSTEMS Ralph C. Merkle ELXSi International ......

Add to Reading List

Source URL: www.merkle.com

Language: English - Date: 2010-07-19 01:52:15
64Expert Evidence Report Ballan Road and Westbrook PSPs Prepared by Fotios Spiridonos – Innovative Transport Strategies Pty Ltd

Expert Evidence Report Ballan Road and Westbrook PSPs Prepared by Fotios Spiridonos – Innovative Transport Strategies Pty Ltd

Add to Reading List

Source URL: www.bicyclenetwork.com.au

Language: English - Date: 2014-04-23 01:05:36
65iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
66INTERNET STANDARDS AND WEB SECURITY Jeff Hodges PayPal August 2012

INTERNET STANDARDS AND WEB SECURITY Jeff Hodges PayPal August 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-08-23 16:12:20
67CIS 331 Introduction to Networks & Security April 16, 2014 Homework 4: Exam Review

CIS 331 Introduction to Networks & Security April 16, 2014 Homework 4: Exam Review

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
68REDIRECT TO SMB  REDIRECT TO SMB A CYLANCE SPEAR TEAM WHITE PAPER Lead Researcher: Brian Wallace // @botnet_hunter

REDIRECT TO SMB REDIRECT TO SMB A CYLANCE SPEAR TEAM WHITE PAPER Lead Researcher: Brian Wallace // @botnet_hunter

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-04-13 03:55:39
69The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija J.D. Tygar

The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija J.D. Tygar

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
70Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley   Abstract

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31