Keyword : man-in-the-middle attack


Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
Kosei ENDO Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 153-161
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundation
Keyword: 
RFIDauthentication protocolHB protocolman-in-the-middle attack
 Summary | Full Text:PDF(658.7KB)

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol
Yunho LEE Seungjoo KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/07/01
Vol. E89-A  No. 7 ; pp. 2084-2087
Type of Manuscript:  LETTER
Category: Digital Signal Processing
Keyword: 
fingerprintinganonymous buyer-seller protocolwatermarkingman-in-the-middle attack
 Summary | Full Text:PDF(274.1KB)

Defense Against Man-in-the-Middle Attack in Client-Server Systems with Secure Servers
Dimitrios N. SERPANOS Richard J. LIPTON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/10/01
Vol. E86-B  No. 10 ; pp. 2966-2970
Type of Manuscript:  Special Section LETTER (IEICE/IEEE Joint Special Issue on Assurance Systems and Networks)
Category: 
Keyword: 
digital rights managementantivirus technologyundetectable virusman-in-the-middle attack
 Summary | Full Text:PDF(136.7KB)