Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,393,518 papers from all fields of science
Search
Sign In
Create Free Account
Man-in-the-middle attack
Known as:
Credential forwarding attack
, Middleman attack
, Man-in-the-Middle
Expand
In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM, MiM attack, MitMA or the same using all capital letters…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3-D Secure
Application security
Authentication
Badlock
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Detecting man in the middle attack
Sahil Dambee
,
Nikhita Mangaonkar
2018
Corpus ID: 70317250
With Cyber-attacks and cyber-threats are increasing, network security needs to be seen in a new dimension. WLANs (Wireless Local…
Expand
2018
2018
Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack
Muhammad Arzaki
International Conference on Information and…
2018
Corpus ID: 53288280
In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key…
Expand
Highly Cited
2017
Highly Cited
2017
Time efficient secure DNA based access control model for cloud computing environment
Suyel Namasudra
,
Pinki Roy
,
P. Vijayakumar
,
S. Audithan
,
B. Balusamy
Future generations computer systems
2017
Corpus ID: 7398981
2012
2012
Analysis on Man in the Middle Attack on SSL
Pushpendra Kumar Pateriya
,
Srijith S. Kumar
2012
Corpus ID: 61732678
ABSTRACT Man-In-The-Middle attack is the major attack on SSL. Some of the major attacks on SSL are ARP poisoning and the phishing…
Expand
2009
2009
Detecting Man-in-the-Middle Attacks by Precise Timing
B. Aziz
,
G. Hamilton
Third International Conference on Emerging…
2009
Corpus ID: 18489395
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with…
Expand
2009
2009
Wireless Intrusion Detection for defending against TCP SYN flooding attack and man-in-the-middle attack
Huan-rong Tang
,
Rouyu Sun
,
Weiqiang Kong
International Conference on Machine Learning and…
2009
Corpus ID: 21113589
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more…
Expand
2007
2007
Discovering Man-in-the-Middle Attacks in Authentication Protocols
R. Guha
,
Z. Furqan
,
Shahabuddin Muhammad
IEEE Military Communications Conference
2007
Corpus ID: 21469259
Security protocols are widely used to provide secure communication in many critical applications such as e-commerce and defense…
Expand
2007
2007
Security programming using Python: man-in-the-middle attacks
R. Snyder
Annual Conference on Information Security…
2007
Corpus ID: 30877648
Many security concepts become more clear to students when operationalized in the context of a programming language. Unfortunately…
Expand
2003
2003
Defense against man-in-the-middle attack in client-server systems
D. Serpanos
,
R. Lipton
Proceedings. Sixth IEEE Symposium on Computers…
2003
Corpus ID: 1942242
The deployment of several client-server applications over the Internet and emerging networks requires the establishment of the…
Expand
1995
1995
Combinatorial Bounds on Authentication Codes with Arbitration
K. Kurosawa
,
Satoshi Obana
Des. Codes Cryptogr.
1995
Corpus ID: 15537504
Unconditionallysecure authentication codes with arbitration ( A2-codes)protect against deceptions from the transmitter and the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE