Man-in-the-middle attack

Results: 286



#Item
71Kai Engert  https://kuix.de

Kai Engert https://kuix.de

Add to Reading List

Source URL: kuix.de

Language: English - Date: 2012-02-06 06:51:49
72Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
73Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
74Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley   Bruce Schneier

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
75Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1.  Dominik Schürmann

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
76Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards Jian-Zhu Lu? , Shaoyuan Zhang, and Shijie Qie Department of Computer Science, Jinan University, Guangzhou, Guangdong, China

Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards Jian-Zhu Lu? , Shaoyuan Zhang, and Shijie Qie Department of Computer Science, Jinan University, Guangzhou, Guangdong, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-13 05:22:49
77WEBTRUST® FOR CERTIFICATION AUTHORITIES – SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 BASED ON:

WEBTRUST® FOR CERTIFICATION AUTHORITIES – SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 BASED ON:

Add to Reading List

Source URL: www.webtrust.org

Language: English - Date: 2014-11-17 04:59:56
78Performance analysis of OFDM modulation on indoor broadband PLC channels

Performance analysis of OFDM modulation on indoor broadband PLC channels

Add to Reading List

Source URL: jis.eurasipjournals.com

Language: English
79Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡  Yehuda Lindell§

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
80The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2013-04-29 10:36:57