Man-in-the-middle attack

Known as: Credential forwarding attack, Middleman attack, Man-in-the-Middle 
In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM, MiM attack, MitMA or the same using all capital letters… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest… (More)
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 3
Is this relevant?
2015
2015
In this paper, we investigated the vulnerabilities surrounding software-defined networking (SDN). Specifically, we examined the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
  • Yvo Desmedt
  • Encyclopedia of Cryptography and Security
  • 2011
Suppose that Alice, a high school student, is in danger of receiving a poor grade in math.Her teacher, Bob, mails a letter to… (More)
Is this relevant?
2010
2010
In this paper, we present a man-in-the-middle attack on 3G-WLAN internetworking, one of the widely used technologies in real… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e… (More)
  • figure 1
Is this relevant?
2009
2009
Phishing is a social engineering mechanism to steal the user's credentials which are then used for identity theft leading to… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In Crypto’05, Juels and Weis proposed an efficient and provably secure authentication protocol for RFID devices, namely HB. The… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Deploying a new security protocol is expensive. This encourages system designers to look for ways of re-using existing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?