Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,468,577 papers from all fields of science
Search
Sign In
Create Free Account
Interlock protocol
Known as:
Interlock (disambiguation)
The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
All-or-nothing transform
Authentication
Computer security
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
defeating active Phishing attacks for Web-based transactions
Xin-gao Luo
2019
Corpus ID: 160029277
Till now, the best defense against phishing is the use of two-factor authentication systems. Yet this protection is short-lived…
Expand
2018
2018
Pengamanan Pesan Komunikasi Menggunakan Algoritma Rsa, Rabbin Miller Dan Fungsi Sha-1 Serta Penanganan Man In The Middle Attack Dengan Interlock Protocol
Sony Bahagia Sinaga
2018
Corpus ID: 70210879
Komunikasi informasi saat ini telah berkembang dengan luas. Komunikasi informasi baik dalam bentuk saling bertukar pesan…
Expand
Review
2017
Review
2017
Result of intramedullary interlock nailing in fracture proximal third tibia in rural hospital
Burande Vg
,
P. JuneNamdev
,
R. LamtureDeepak
,
Dhaniwala Ns
2017
Corpus ID: 54584900
Aim: Tibia is one of the most commonly fractured bone. Proximal third tibial fracture account for 5% to 11% of tibial shaft…
Expand
2017
2017
Secure pairing with wearable devices by using ambient sound and light
Dong Liu
,
J. Chen
,
Qisi Deng
,
A. Konate
,
Zairong Tian
Wuhan University Journal of Natural Sciences
2017
Corpus ID: 22463187
Wearable devices usually work together with smart phones. To ensure only legitimate smart phones can read the data, they must…
Expand
2017
2017
Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles
V. Prabhu
,
M. Bahaei
2017
Corpus ID: 64517815
Review
2016
Review
2016
Proficient Techniques and Protocols for the Identification of Attacks in WSN: A Review
Preeti Sharma
,
G. Gupta
2016
Corpus ID: 63075098
Objectives: In WSN (Wireless Sensor Network) attacks are the central concern. In this paper, we discuss various authentication…
Expand
2015
2015
ANALYSIS OF BLUETOOTH THREATS AND V 4 . 0 SECURITY FEATURES ( LEARNING ASSOCIATION RULE ) *
Aditi Vats
,
Kritika Singh
,
D. Rajpoot
2015
Corpus ID: 73558151
In today’s world the technology which is made wireless communication easier is Bluetooth technology which is used for…
Expand
2014
2014
A Piggybank Protocol for Quantum Cryptography
Navya Chodisetti
arXiv.org
2014
Corpus ID: 20564418
This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea…
Expand
2008
2008
SIMULASI PENCEGAHAN MAN-IN-THE-MIDDLE ATTACKDENGAN INTERLOCK PROTOCOL
Flavio Borges
2008
Corpus ID: 64876170
Man-in-the-Middle Attack merupakan bentuk gangguan keamanan dengan metode penyadapan yang dilakukan oleh seorang cryptanalyst…
Expand
2005
2005
The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks
K. Svozil
2005
Corpus ID: 61263148
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE