Skip to search formSkip to main contentSkip to account menu

Interlock protocol

Known as: Interlock (disambiguation) 
The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Till now, the best defense against phishing is the use of two-factor authentication systems. Yet this protection is short-lived… 
2018
2018
Komunikasi informasi saat ini telah berkembang dengan luas. Komunikasi informasi baik dalam bentuk saling bertukar pesan… 
Review
2017
Review
2017
Aim: Tibia is one of the most commonly fractured bone. Proximal third tibial fracture account for 5% to 11% of tibial shaft… 
2017
2017
Wearable devices usually work together with smart phones. To ensure only legitimate smart phones can read the data, they must… 
Review
2016
Review
2016
Objectives: In WSN (Wireless Sensor Network) attacks are the central concern. In this paper, we discuss various authentication… 
2015
2015
In today’s world the technology which is made wireless communication easier is Bluetooth technology which is used for… 
2014
2014
This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea… 
2008
2008
Man-in-the-Middle Attack merupakan bentuk gangguan keamanan dengan metode penyadapan yang dilakukan oleh seorang cryptanalyst…