نتایج جستجو برای: man in the middle attack

تعداد نتایج: 21229460  

Journal: :Computer Networks 2013
Seung Yeob Nam Sirojiddin Djuraev Minho Park

In this paper, we propose a new mechanism for counteracting ARP (Address Resolution Protocol) poisoning-based Man-in-the-Middle (MITM) attacks in a subnet, where wired and wireless nodes can coexist. The key idea is that even a new node can be protected from an ARP cache poisoning attack if the mapping between an IP and the corresponding MAC addresses is resolved through fair voting among neigh...

Journal: :Europan journal of science and technology 2022

Everyone has accepted that the most vital resource of our age is information. As information felt more and as a power factor, great changes are taking place in ways thinking perceiving, research methods lifestyles. In this context, importance cyber threats emerged especially recent years to protect these matter discussion. MITM attacks pose significant threat network security they interrupt com...

پایان نامه :0 1374

this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...

2011
Lei Wei Christian Rechberger Jian Guo Hongjun Wu Huaxiong Wang San Ling

This paper presents ongoing work towards extensions of meetin-the-middle (MITM) attacks on block ciphers. Exploring developments in MITM attacks in hash analysis such as: (i) the splice-and-cut technique; (ii) the indirect-partial-matching technique. Our first contribution is that we show corrections to previous cryptanalysis and point out that the key schedule is more vulnerable to MITM attack...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

any change in the refractive index of a laser active medium can lead to serious degradation of beam quality, laser beam modes, laser performance and variation in the intensity distribution. alteration in the refractive index of laser active medium is especially notable in high power lasers. it is clear that in the laser beam production, the pumping agent induces a great amount of heat which...

Journal: :J. Internet Serv. Inf. Secur. 2014
Alberto Gugel Benjamin Aziz Geoff Hamilton

We have analysed the well-known BAN modified Andrew Secure RPC authentication protocol by means of the AVISPA Web tool considering all the available back-ends and with the basic configurations of sessions. The protocol has been found vulnerable to a replay/mutation attack based on homomorphism by one of the back-ends. In order to fix it, we integrated into the protocol a common solution, includ...

Journal: :IACR Cryptology ePrint Archive 2013
Guangjun Fan Yongbin Zhou Hailong Zhang Dengguo Feng

Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, the question of whether Template Attack is really optimal in terms of leakage exploitation rate is still unclear. In this paper, we present a n...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تهران - دانشکده علوم 1357

in his last years of life americans had almost forgotton steinbeck, and those who had not, occasionally criticized him for supporting and praising the u. s. military intervention in the vietnam war. althought ateinbeck incorporates different themes into his works, each one bears many signs of his concern and sympathy for america and the american common people in particular. steinbecks to a god ...

Journal: :Computers & Security 2015
Yaoqi Jia Yue Chen Xinshu Dong Prateek Saxena Jian Mao Zhenkai Liang

In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM) attack on a user’s HTTPS session, and substitutes cached resources with malicious ones. We investigate the feasibility of such attacks on five mainstream desktop browsers and 16 popular mobile browsers. We find that browsers are highly in...

2003
D. A. Stone A. J. Weaver

Trends in the diurnal temperature range (DTR) are examined in the late twentieth and the twenty-first centuries in a coupled climate model representing the atmosphere, ocean, sea ice, and land surface systems. Consistent with past studies, the DTR decreases during this time. These decreases are concentrated in middle latitudes, with much smaller changes occurring in the low latitudes. Strong se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید