نتایج جستجو برای: the man

تعداد نتایج: 16069788  

2011

This paper is the result of a study which analyzes the characteristics of mobile data with regard to both amount and content of the data collected. It will be shown what information is revealed through a man-in-the-middle attack on an unjailbroken iPhone 3GS within one week of internet usage. The results will reveal that the average transfer size of a datastream is very small in comparison to t...

Journal: :CoRR 2012
Gang Liao Lei Liu Lian Luo

In this computer era of rapid development, software development can be seen everywhere, but a lot of softwares are dead in modern development of software. Just as The Mythical Man-Month said, it exists a problem in the software development, and the problem is interflow. A lock of interflow can be said great calamity. Clustering is a environment to breed new life. In this thesis, we elaborate ho...

Journal: :IACR Cryptology ePrint Archive 2008
Julien Bringer Hervé Chabanne

Since the introduction at Crypto’05 by Juels and Weis of the protocol HB, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security. We propose here a new approach to achieve resistance against Man-in-The-Middle attacks. Our requirements – in terms of extra communications and hardware – are surprisingly low.

Journal: :IACR Cryptology ePrint Archive 2010
Junfeng Fan Jens Hermans Frederik Vercauteren

In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presented privacy proofs for EC-RAC.

Journal: :I. J. Network Security 2005
Cheng-Ying Yang Cheng-Chi Lee Shu-Yin Hsiao

In 2003, Novikov and Kiselev proposed an authentication of the user from the remote autonomous object. In this article, we shall show that the Novikov-Kiselev scheme cannot against a man-in-the-middle attack.

2009
Joshua Sunshine Serge Egelman Hazim Almuhimedi Neha Atri Lorrie Faith Cranor

Web users are shown an invalid certificate warning when their browser cannot validate the identity of the websites they are visiting. While these warnings often appear in benign situations, they can also signal a man-in-the-middle attack. We conducted a survey of over 400 Internet users to examine their reactions to and understanding of current SSL warnings. We then designed two new warnings us...

2010
Wilfrid Hodges

In the last half century Ibrahim Madkour revolutionised the study of Arabic logic by making available a modern edition of the text of the Logic section of Ibn Sı̄nā’s Šifā’. Ibn Sı̄nā’s account of logic in the Šifā’ is much fuller than any of his other surviving accounts; it runs to some two thousand pages. It is also — in my view — more radical and more independent of Aristotle than his other ac...

Journal: :IACR Cryptology ePrint Archive 2014
Ashok Kumar Das

In 2013, Althobaiti et al. proposed an efficient biometricbased user authentication scheme for wireless sensor networks. We analyze their scheme for the security against known attacks. Though their scheme is efficient in computation, in this paper we show that their scheme has some security pitfalls such as (1) it is not resilient against node capture attack, (2) it is insecure against imperson...

2012
Johannes Braun Moritz Horsch Alexander Wiesmaier

Recent attacks on the German identity card show that a compromised client computer allows for PIN compromise and man-inthe-middle attacks on eID cards. We present a selection of new solutions to that problem which do not require changes in the card specification. All presented solutions protect against PIN compromise attacks, some of them additionally against man-in-the-middle attacks.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید