نتایج جستجو برای: man in the middle mitm
تعداد نتایج: 21225329 فیلتر نتایج به سال:
We present a simple method for constructing identiication schemes resilient against impersonation and man-in-the-middle attacks. Though zero-knowledge or witness hiding protocols are known to withstand attacks of the rst kind, all such protocols previously proposed suuer from a weakness observed by Bengio et al. : a malicious veriier may simply act as a moderator between the prover and yet anot...
Recently, Tseng and Wu pointed out that the second protocol of Biswas’s two-party keys scheme based on the Diffie-Hellman technique has a security weakness and proposed a new protocol to remedy the weakness. In this article, we point out that Tseng-Wu’s protocol is vulnerable to a man-in-the-middle attack. An attacker could intercept, delete, or modify the communicated messages between two comm...
Bilinear pairings based mutual authentication scheme using smart card is presented. We propose a novel technique of using two different servers, one for registration and other for authentication. The scheme is resilient to replay, forgery, man-in-the-middle and insider attacks.
The increase in network connectivity has also resulted in several high-profile attacks on cyber-physical systems. An attacker that manages to access a local network could remotely affect control performance by tampering with sensor measurements delivered to the controller. Recent results have shown that with network-based attacks, such as Man-in-the-Middle attacks, the attacker can introduce an...
Recently, bio-information has been playing an important role in modern user authentication schemes. In 2004, Lin and Lai proposed a flexible biometrics remote user authentication scheme. However, their scheme is vulnerable and cannot provide mutual authentication between user and remote system. Hence, Khan and Zhang improved the security of a flexible biometrics remote user authentication schem...
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...
Supervisory control and Data Acquisition (SCADA) systems play a core role in a nation’s critical infrastructure, overseeing the monitoring and control of systems in electricity, gas supply, logistics services, banks and hospitals. Monitoring safety and security properties in industrial control system (ICS) and SCADA environments faces unique challenges not found in typical enterprise networks. ...
Trends in the diurnal temperature range (DTR) are examined in the late twentieth and the twenty-first centuries in a coupled climate model representing the atmosphere, ocean, sea ice, and land surface systems. Consistent with past studies, the DTR decreases during this time. These decreases are concentrated in middle latitudes, with much smaller changes occurring in the low latitudes. Strong se...
Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play “man-in-the-middle” attacks. In this paper we consider one of the strongest forms of these attacks, namely resettably non-transferable identification introduced in [Bellare et al., Eurocrypt 2001]. This notion immunizes a scheme from powerful a...
This paper considers the security issue of the fifth-generation (5G) wireless networks with massive connections, where multiple eavesdroppers aim to intercept the confidential messages through active eavesdropping. To realize secure massive access, non-orthogonal channel estimation (NOCE) and nonorthogonal multiple access (NOMA) techniques are combined to enhance the signal quality at legitimat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید