Man-in-the-middle attack

Results: 286



#Item
161Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2014-09-25 17:19:13
162Cyberwarfare / Denial-of-service attack / SQL injection / Malware / Man-in-the-middle attack / Penetration test / Computer security / Extensible Authentication Protocol / Password / Computer network security / Computing / Security

Index Note to the Reader:  Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations. CO

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-07-28 07:17:40
163Man-in-the-middle attack / Public-key cryptography / DCF Interframe Space / Network packet / Transmission Control Protocol / Computing / Information / Technology / IEEE 802.11 / Bluetooth

Secure In-Band Wireless Pairing Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, and Dina Katabi Massachusetts Institute of Technology A BSTRACT Alliance does not fully address WiFi security. DiffieHellman’s key

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2012-07-17 20:03:01
164Electronic commerce / Email authentication / Public key certificate / Certificate authority / S/MIME / Digital signature / Man-in-the-middle attack / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / Key management

Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan University of Birmingham, UK CloudTomo Ltd.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-16 09:42:59
165JavaScript / World Wide Web / Man-in-the-middle attack / Malware / Form / Password / Cross-site request forgery / Computing / Software / Cross-platform software

HProxy: Client-side detection of SSL stripping attacks Nick Nikiforakis, Yves Younan, and Wouter Joosen IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:05:57
166Authentication / Computer network security / Man-in-the-middle attack / Password / Certificate authority / Cryptographic nonce / IEEE 802.1X / Cryptography / Security / Authenticator

FIDO Security Reference FIDO Alliance Proposed Standard 09 October 2014 This version: https://fidoalliance.org/specs/fido­uaf­authnr­metadata­service­v1.0­ps­[removed]html Previous version: https://fidoa

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-12-09 14:43:35
167Authenticator / Authentication / Computer network security / Man-in-the-middle attack / Password / Cryptographic nonce / IEEE 802.1X / Security / Cryptography / Computer security

FIDO Security Reference FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps[removed]/fido-security-ref-v1.0-ps[removed]html Previous version: https://fidoal

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-12-08 17:39:06
168Electronic commerce / Secure communication / Extended Validation Certificate / CA/Browser Forum / Certificate authority / X.509 / Public key certificate / Man-in-the-middle attack / Comparison of SSL certificates for web servers / Cryptography / Key management / Public-key cryptography

Microsoft Word - WTEV1_4_5.docx

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2014-04-04 19:28:36
169Key management / Cryptographic protocols / HTTP / Secure communication / HTTP Secure / Transport Layer Security / Man-in-the-middle attack / Public key certificate / Phishing / Cryptography / Computing / Public-key cryptography

Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith Lars Baumgärtner, Bernd Freisleben

Add to Reading List

Source URL: android-ssl.org

Language: English - Date: 2013-11-04 08:43:40
170Electronic commerce / Secure communication / Internet standards / CA/Browser Forum / Public key certificate / Certificate authority / X.509 / Man-in-the-middle attack / Certificate policy / Cryptography / Key management / Public-key cryptography

Microsoft Word - WTBR_2_0.docx

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2014-04-04 19:28:33
UPDATE