Zobrazeno 1 - 10
of 658
pro vyhledávání: '"MITM"'
Publikováno v:
IEEE Access, Vol 12, Pp 23096-23121 (2024)
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN). MC-MitM attacks are possib
Externí odkaz:
https://doaj.org/article/6959696586d840ee9bb1009a4fc02e74
Publikováno v:
IEEE Access, Vol 12, Pp 138483-138500 (2024)
The present era is characterized by the interconnection, communication, connectivity, and data exchange of Internet of Things (IoT) devices. However, current systems often neglect to incorporate security protocols for IoT devices in the energy sector
Externí odkaz:
https://doaj.org/article/f5fbd4ed212a41ae84bfaf5c6c724585
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed symmetric primitive. While the cipher was designed to be immune against differential and other classical attacks, this immunity does not hold in the rel
Externí odkaz:
https://doaj.org/article/23bb44c39247402ab12d97d99c221b54
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establishment (ALE) messages in high frequency radio, a technology commonly used by the military, other government agencies and industries which require high
Externí odkaz:
https://doaj.org/article/6c5b32769ff94426a1fe9df13b51bf05
Autor:
André Schrottenloher, Marc Stevens
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 3 (2023)
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem. Bao
Externí odkaz:
https://doaj.org/article/432c3be60f174d4bb2a29704f7d6f423
Autor:
Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Bt Zen, Johari Bin Abdullah, Rozeha Binti A. Rashid, Yasir Javed, Nayeem Ahmad Khan, Ahmed M. Mostafa
Publikováno v:
IEEE Access, Vol 11, Pp 20524-20541 (2023)
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. Cell-Free gained researchers’ interest as it offers ub
Externí odkaz:
https://doaj.org/article/c66022ddd49c4893a66d578a932b80c5
Autor:
Parul Sindhwad, Faruk Kazi
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 32, Iss 1, Pp 270-279 (2022)
Industrial Control Systems (ICS) are transitioning from isolated, custom built systems to those employing general purpose computer hosts, wireless networks, and artificial intelligence. An increasing number of vulnerabilities in ICS devices is a majo
Externí odkaz:
https://doaj.org/article/70d99c672549465bb0e3dc2a099bd014
Publikováno v:
International Journal of Informatics, Information System and Computer Engineering, Vol 3, Iss 2, Pp 143-162 (2022)
As the digital world evolves, so does potential problem that computer users encounter. Cybersecurity threats are still evolving and expanding. Unfortunately, most computer users do not understand this properly. The cloud models offered by various
Externí odkaz:
https://doaj.org/article/0c2185cd0dfb484291ad1d48a259cbbb
Publikováno v:
Computers, Vol 12, Iss 12, p 262 (2023)
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices t
Externí odkaz:
https://doaj.org/article/03c8b661436b41f2a84b7b511977c859
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.