نتایج جستجو برای: man in the middle mitm

تعداد نتایج: 21225329  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده ادبیات و علوم انسانی 1391

abstract governing was disorganized for years, when mongols attached to iran and it caused to clearing way for interference of mongols princes. dispatching of holaku to the west culminated in establishing iilkhanan government. holakus activities in destruction of abbaasis government and activities which shows his staying in iran, made force oulus juji to comparison against iilkhanis gover...

Journal: :International journal of network security and applications 2021

In this paper, we examined the effect on network performance of various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks wireless network, such as fleet or random strategies. particular, we're focusing some those goals for MITM attackers - message delay, dropping. According simulation data, these have a significant legitimate nodes in causing vast amounts infected p...

2011
Ming-Hsing Chiu Kuo-Pao Yang Randall Meyer Tristan Kidder

With the rapid growth of the Internet user population and the magnitude of the applications depending on the Internet these days, network security measures are becoming extremely important. For the Internet users, one of the best defenses against network attacks is to understand the patterns of the attacks and raise the awareness of abnormality as much as possible. In this paper, an experiment ...

Journal: :CoRR 2017
Thibault de Valroger

We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited calculation and storage capacities. The resistance to unlimitedly powered MITM is obtained through the combined use of Deep Random secrecy, formerly introduced [9] and proved as unco...

2010
Toufik Mansour Yidong Sun

Let π = π1π2 · · · πn be any permutation of length n, we say a descent πiπi+1 is a lower, middle, upper if there exists j > i + 1 such that πj < πi+1, πi+1 < πj < πi, πi < πj, respectively. Similarly, we say a rise πiπi+1 is a lower, middle, upper if there exists j > i + 1 such that πj < πi, πi < πj < πi+1, πi+1 < πj, respectively. In this paper we give an explicit formula for the generating fu...

Journal: :JIPS 2009
Guo Hao Guo Tao

Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks.

Journal: :Network Security 2010
Ori Eisen

There is mounting pressure on companies to detect fraud perpetrated by the new generation of cyber-fraudsters who are becoming adept at impersonating genuine customers – by being the Man-in-the-Middle or the Man-in-the-Browser. Ori Eisen, founder and Chief Innovation Officer of 41st Parameter, explains this new threat to data security and describes how DeviceInsight technology can help to detec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده منابع طبیعی و علوم دریایی 1388

this research was conducted in two protect and destroy region in the middle zagros, in illam province. in order to identification of ecological species group and evaluate density of regeneration, effect of many factors such as protection, vegetation, physiographic factors, physical and chemical properties of soil in study locations were studied. to achieve these purpose number of 54 plots using...

Journal: :Des. Codes Cryptography 2001
Kaoru Kurosawa Satoshi Obana

Unconditionally secure authentication codes with arbitration (A 2-codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities and the sizes of keys of A 2-codes. Especially, our bounds for A 2-codes without secrecy are all tight for small size of source states.

Journal: :International Journal of Information Security 2021

Abstract Man-in-the-Middle (MitM), one of the best known attacks in world computer security, is among greatest concerns for professionals field. Main goal MitM to compromise confidentiality, integrity and availability data flowing between source destination. However, most its many variants involve difficulties that make it not always possible. The present paper aims at modelling describing a ne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید