Man-in-the-middle attack

Results: 286



#Item
191Domain Name System Security Extensions / X.509 / Man-in-the-middle attack / Public key infrastructure / Public key certificate / HTTP Strict Transport Security / Certificate authority / Cryptography / Public-key cryptography / Key management

Abstract - The Search for Trust

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-14 11:58:17
192Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Certificate authority / Public key certificate / Cryptography / Key management / Public-key cryptography

Abstract - Certificate Transparency - protocol design and implementation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 13:24:03
193Cipher / Key / Symmetric-key algorithm / Man-in-the-middle attack / Cryptographic key types / Cryptography / Key management / Public-key cryptography

algo logic Algologic Research and Solutions Technical Report Negotiating public keys in asymmetric key cryptography

Add to Reading List

Source URL: www.freewebs.com

Language: English
194Electronic commerce / Secure communication / Cryptographic protocols / Certificate authority / Public key certificate / HTTP Secure / Revocation list / Man-in-the-middle attack / Computer security / Cryptography / Public-key cryptography / Key management

Abstract - Evaluating certificate trust model enhancements for HTTPS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 12:39:19
195Cryptographic protocols / Internet / Secure communication / Internet protocols / Internet standards / Phishing / Man-in-the-middle attack / Transport Layer Security / Password / Cryptography / Computing / Computer network security

Abstract - Defenses against Spoofed SSL/TLS Server Certificates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 12:39:54
196Cryptographic protocols / Secure communication / Electronic commerce / Public key certificate / HTTP Secure / Transport Layer Security / Certificate authority / X.509 / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Rethinking SSL Development in an Appified World Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith Distributed Computing & Security Group Leibniz University Hannover, Germany Hannover, Germany

Add to Reading List

Source URL: android-ssl.org

Language: English - Date: 2013-11-04 08:37:37
197Secure Shell / Email encryption / Encryption / Cipher / Deniable encryption / Cryptography / Public-key cryptography / Man-in-the-middle attack

Introduction to Securing Data in Transit Jennifer Vesperman [removed] 2002−02−24 Revision History

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2002-03-20 10:51:36
198Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-25 17:34:38
199Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-12-05 17:18:58
UPDATE