نتایج جستجو برای: mitm attack

تعداد نتایج: 80860  

Journal: :International journal of interactive mobile technologies 2023

I
 n these days of technology, the usage images has become increasingly high especially now that almost everyone access to internet. Also, image helps us learn, grabs our attention, explains complicated concepts as well inspires us. Sharing is essential and therefore encryption algorithms are proposed secure transmission from many types attacks such Man-in-the-middle attack (MITM). In this...

2012
Italo Dacosta Mustaque Ahamad Patrick Traynor

The security guarantees provided by SSL/TLS depend on the correct authentication of servers through certificates signed by a trusted authority. However, as recent incidents have demonstrated, trust in these authorities is not well placed. Increasingly, certificate authorities (by coercion or compromise) have been creating forged certificates for a range of adversaries, allowing seemingly secure...

2013
Zhuo Hao Sheng Zhong Nenghai Yu

A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we f...

Journal: :IEEE Internet of Things Journal 2017
Cheng Li Zhengrui Qin Ed Novak Qun Li

While the IoT is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work shows that Software-defined Networking (SDN) has a great capability in automatically and dynamically managing network flows. Besides, switches in SDNs are usually powerful machines, which can be used as fog nodes simultan...

Journal: :acta medica iranica 0
j.lotfi

detection and modification of the risk factors of stroke may be the most effective strategy for preventing its often irreversible consequences. a longitudinal prospective study was implemented to evaluate the effect of several risk factors on the course of cerebrovascular disease. the study groups were composed of 3s8 normal volunteers, and 308 patients with transient ischemic attacks. the two ...

Journal: :acta medica iranica 0
massoud ghasemi research center of endovascular intervention, tehran, iran. maryam mehrpooya department of cardiology, imam khomeini hospital complex, tehran university of medical sciences, tehran, iran. and department of cardiology, school of medicine, tehran university of medical sciences, tehran, iran. farshad ghasemi mount sini hospital, university of toronto, toronto, canada. fatemeh shahbazi department of biology, payame noor university, tehran, iran.

our aim was to report techniques and our experience in one-stage angioplasty and stenting of ostium of left common carotid and left internal carotid arteries in an octogenarian man with transient ischemic attack, who was completely recovered from neurologic insults short time after the procedure. an 81-year-old man presented with a transient ischemic attack. neurologic examination showed left s...

2014
J. ZHANG L. SANKAR K. HEDMAN

The electric grid is a complex physically distributed and inter-connected network managed by a large number of entities (e.g., systems operators, utilities) to ensure reliable transmission, generation, and distribution of power. Sustained and reliable operation with dynamic situational awareness in the grid requires continued data sharing amongst the grid entities. Lack of automated communicati...

2017
Jae-geun Moon Im Young Jung Jaesoo Yoo

Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man...

2017
Nirnimesh Ghose Loukas Lazos Ming Li

Bootstrapping trust between wireless devices without entering or preloading secrets is a fundamental security problem in many applications, including home networking, mobile device tethering, and the Internet-of-Things. This is because many new wireless devices lack the necessary interfaces (keyboard, screen, etc.) to manually enter passwords, or are often preloaded with default keys that are e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید