Man-in-the-middle attack

Results: 286



#Item
81Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
82CAPTCHA / Alan Turing / Theoretical computer science / Turing test / Oracle machine / IP / Zero-knowledge proof / Man-in-the-middle attack / Algorithm / Cryptography / Artificial intelligence / British people

Cryptography Using Captcha Puzzles Abishek Kumarasubramanian1 , Rafail Ostrovsky1 ? , Omkant Pandey2 , and Akshay Wadia1 1 University of California, Los Angeles

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-16 04:12:08
83Certificate authority / Man-in-the-middle attack / Digital signature / Alice and Bob / Public key infrastructure / Public key certificate / RSA / Cryptography / Public-key cryptography / Key management

KEY DISTRIBUTION 1/1 The public key setting

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-06-02 11:33:43
84Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
85Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Man-in-the-middle attack / Public-key cryptography / Password / Cryptography / Secure communication / Cryptographic protocols

Thou Shalt not Leak your Keys: Practical Key Privilege Separation Using Caml Crush M. DAUBIGNARD

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-01 08:17:00
86Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2004-12-12 23:04:41
87Denial-of-service attacks / Internet Relay Chat / Cryptographic protocols / LOIC / HTTP Secure / Man-in-the-middle attack / Certificate authority / Denial-of-service attack / Ident / Cryptography / Public-key cryptography / Key management

CIS 331 Introduction to Networks & Security March 5, 2015 Homework 4: HTTPS, Denial of Service

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-14 15:46:02
88Disk encryption / Cryptographic protocols / Cross-platform software / TrueCrypt / Secure communication / AES implementations / HTTP Secure / Man-in-the-middle attack / Fortuna / Software / Cryptography / Cryptographic software

Security Now! #The TrueCrypt Audit  ( Elaine is fine! -- It was apparently just a transient eMail glitch. All is wel! ) This week on Security Now! ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-07 13:11:05
89Data security / Internet privacy / Key escrow / Key / Information security / Secure communication / Clipper chip / Man-in-the-middle attack / Disk encryption / Cryptography / Key management / Public-key cryptography

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
90Cryptographic protocols / Notary / Digital signature / X.509 / Public key certificate / Pretty Good Privacy / Certificate authority / Electronic signature / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Signatures: an Interface between Law and Technology Ben Laurie Nicholas Bohm

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2006-10-26 22:06:14
UPDATE