نتایج جستجو برای: hijack

تعداد نتایج: 677  

Journal: :JCM 2017
Dodi W. Sudiharto Anton Herutomo Yunita N. Rohmah

—Named Data Networking (NDN) is a new design of network architecture and becomes the leading trend of network architecture because of its packet carries the Name of data, it does not carry the information of a source or a destination address, such an IP address packet. In a network routing, a NDN network has an adaptive forwarding mechanism. A NDN router determines packets immediately which pa...

2010
Christopher Soghoian Sid Stamm

This paper introduces the compelled certificate creation attack, in which government agencies may compel a certificate authority to issue false SSL certificates that can be used by intelligence agencies to covertly intercept and hijack individuals’ secure Web-based communications. Although we do not have direct evidence that this form of active surveillance is taking place in the wild, we show ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید