Zobrazeno 1 - 10
of 678
pro vyhledávání: '"mitm"'
Publikováno v:
IEEE Access, Vol 12, Pp 23096-23121 (2024)
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN). MC-MitM attacks are possib
Externí odkaz:
https://doaj.org/article/6959696586d840ee9bb1009a4fc02e74
Publikováno v:
IEEE Access, Vol 12, Pp 138483-138500 (2024)
The present era is characterized by the interconnection, communication, connectivity, and data exchange of Internet of Things (IoT) devices. However, current systems often neglect to incorporate security protocols for IoT devices in the energy sector
Externí odkaz:
https://doaj.org/article/f5fbd4ed212a41ae84bfaf5c6c724585
Autor:
Abbas Javed, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi, Muhammad Jawad, Jehangir Arshad, Hadi Larijani
Publikováno v:
Sensors, Vol 24, Iss 22, p 7320 (2024)
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to th
Externí odkaz:
https://doaj.org/article/8ea34b09861d449c8b316d4c01791ff6
Autor:
Marwan Aziz Mohammed, Ali Ali Saber Mohammed, Pshtiwan Shakor, Salam Khalaf Abdullah, Saad Jabbar Abbas, Mohammed Abdulkreem Mohammed, Pardaz Zhumabaevna Kozhobekova
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 35, Iss 1, p 451 (2024)
Background: As the digital age unfolds, the requirement for durable, high-throughput communication systems grows inexorably. The convergence of Machine-to-Machine Communication (M2M) with emerging sixth-generation (6G) technology provides novel solut
Externí odkaz:
https://doaj.org/article/9372f349c8b74535ae0b15f11a30fd0d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed symmetric primitive. While the cipher was designed to be immune against differential and other classical attacks, this immunity does not hold in the rel
Externí odkaz:
https://doaj.org/article/23bb44c39247402ab12d97d99c221b54
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establishment (ALE) messages in high frequency radio, a technology commonly used by the military, other government agencies and industries which require high
Externí odkaz:
https://doaj.org/article/6c5b32769ff94426a1fe9df13b51bf05
Autor:
Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Bt Zen, Johari Bin Abdullah, Rozeha Binti A. Rashid, Yasir Javed, Nayeem Ahmad Khan, Ahmed M. Mostafa
Publikováno v:
IEEE Access, Vol 11, Pp 20524-20541 (2023)
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. Cell-Free gained researchers’ interest as it offers ub
Externí odkaz:
https://doaj.org/article/c66022ddd49c4893a66d578a932b80c5
Autor:
Parul Sindhwad, Faruk Kazi
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 32, Iss 1, Pp 270-279 (2022)
Industrial Control Systems (ICS) are transitioning from isolated, custom built systems to those employing general purpose computer hosts, wireless networks, and artificial intelligence. An increasing number of vulnerabilities in ICS devices is a majo
Externí odkaz:
https://doaj.org/article/70d99c672549465bb0e3dc2a099bd014
Autor:
André Schrottenloher, Marc Stevens
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 3 (2023)
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem. Bao
Externí odkaz:
https://doaj.org/article/432c3be60f174d4bb2a29704f7d6f423
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.