نتایج جستجو برای: middle mitm

تعداد نتایج: 155067  

2009
Philip S. Hirschhorn Jeffrey Hoffstein Nick Howgrave-Graham William Whyte

We present the new NTRUEncrypt parameter generation algorithm, which is designed to be secure in light of recent attacks that combine lattice reduction and meet-in-the-middle (MITM) techniques. The parameters generated from our algorithm have been submitted to several standard bodies and are presented at the end of the paper.

2010
William Newton Alan T. Sherman Dhananjay S. Phatak Chintan Patel

Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE: EXPLANATION AND DISCUSSION William Newton, Master of Computer Science, 2010 Thesis directed by: Dr. Alan T. Sherman Department of Computer Science In this research paper, I explain David Chaum’s patent that describes the Man-In-The-Middle (MITM) detection protocol. The MITM Detection Protocol (MDP) uses three stages to entrap an...

Journal: :International journal of network security and applications 2021

In this paper, we examined the effect on network performance of various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks wireless network, such as fleet or random strategies. particular, we're focusing some those goals for MITM attackers - message delay, dropping. According simulation data, these have a significant legitimate nodes in causing vast amounts infected p...

Journal: :IJACI 2012
Timothy Dougan Kevin Curran

Man-in-the-Browser attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking. The security community has been aware of them as such for time but they have grown in ability and success during that time. These attacks are a specialised version of Man-in-the-Middle attack, and operate by stealing authentication dat...

Journal: :The Laryngoscope 2014
Sang H Lee Jeong H Jang Dongjun Lee Hye-Ryung Lee Kyu-Yup Lee

OBJECTIVES/HYPOTHESIS To introduce a simple and alternative surgical technique, minimally invasive transcanal myringotomy (MITM), for early stage congenital cholesteatoma in children and to evaluate the feasibility and results of MITM for management of early stage congenital cholesteatoma with respect to its effectiveness and safety. STUDY DESIGN Retrospective review. METHODS Between August...

2017
Shuxin Li Xiaohong Li Jianye Hao Bo An Zhiyong Feng Kangjie Chen Chengwei Zhang

The Man-in-the-Middle (MITM) attack has become widespread in networks nowadays. The MITM attack would cause serious information leakage and result in tremendous loss to users. Previous work applies game theory to analyze the MITM attack-defense problem and computes the optimal defense strategy to minimize the total loss. It assumes that all defenders are cooperative and the attacker know defend...

2009
Ulf Kargén Fredrik Hansson David Byers

Syftet med det här arbetet har varit att utveckla en praktisk Man-In-The-Middle-attack mot trådlösa klienter på NetLogon-systemet vid Linköpings Universitet. Målsättningen har varit att attacken skall ske så transparent som möjligt ur offrets synvinkel. Attacken använder DNS-spoofing och en MITM-metod med förfalskade avsändaradresser genom packet injection. Vi har implementerat ett fungerande v...

Journal: :IACR Cryptology ePrint Archive 2014
Jian Guo Yu Sasaki Lei Wang Meiqin Wang Long Wen

A main contribution of this paper is an improved analysis against HMAC instantiating with reduced Whirlpool. It recovers equivalent keys, which are often denoted as Kin and Kout, of HMAC with 7-round Whirlpool, while the previous best attack can work only for 6 rounds. Our approach is applying the meet-in-the-middle (MITM) attack on AES to recover MAC keys of Whirlpool. Several techniques are p...

Journal: :Information 2014
Won Min Kang Jae Dong Lee Jong Hyuk Park

Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have become mandatory because black box images and voice data have served as forensic...

2008
Rohit Chadha Carl A. Gunter José Meseguer Ravinder Shankesi Mahesh Viswanathan

Current research on verifying security properties of communication protocols has focused on proving integrity and confidentiality using models that include a strong Man-in-the-Middle (MitM) threat. By contrast, protection measures against Denial-of-Service (DoS) must assume a weaker model in which an adversary has only limited ability to interfere with network communications. In this paper we d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید