نتایج جستجو برای: the man
تعداد نتایج: 16069788 فیلتر نتایج به سال:
This paper discusses a new protocol implementing authentication in a multi-located environment that avoids man-in-the-middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent.
Authentication with recently proposed quantum password protocol is secure against impersonation. Here we show that original version of the protocol is not secure against active malicious prover and verifier, however a slight modification provides a possibility for a legitimate party to detect the attacks. The password is reusable in the absence of the attacks. Otherwise the security of the auth...
It would not be rational to establish/operationalised a new climate fund if it is just the same as all the other existing international climate funds. Expectations are that the GCF will, in the longer term, will have an annual turnover in double digit billion dollar figures. It is also clear that such a turnover will not be possible at the outset, not only because of a lack of available funds, ...
In classical sociology, there is a sharp separation between the superstructure reflecting cultural ideals and the concrete Structural Base (SB). The authors hypothesize a Doxical Superstructure (DS) in its own space at a higher level, containing concepts such as completeness, necessity and possibility associated with abstract concepts like beliefs, ethics, knowledge, relations and science. The ...
With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-midd...
In the article we show an attack on the cryptographic protocol of electronic auction with extended requirements [1]. The found attack consists of authentication breach and secret retrieval. It is a kind of “man in the middle attack”. The intruder impersonates an agent and learns some secret information. We have discovered this flaw using OFMC an automatic tool of cryptographic protocol verifica...
As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that supp...
Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-the-Middle (MiTM) attacks. A number of techniques have been proposed to address the problem, butmany are not applicable to devices lacking required interfaces, such as displays or speakers. In this paper, we introduce a new secure...
In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM) attack on a user’s HTTPS session, and substitutes cached resources with malicious ones. We investigate the feasibility of such attacks on five mainstream desktop browsers and 16 popular mobile browsers. We find that browsers are highly in...
One of the parts and parcels of postcolonial literature is to deconstruct the history written by imperialism and to present the one as experienced by the colonized. As victims of British colonialism, Australian Aborigines have always mirrored the historical religious and territorial subjugation of their land in their writings, especially in their dramatic literature because of its high populari...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید