Skip to search formSkip to main contentSkip to account menu

Man-in-the-middle attack

Known as: Credential forwarding attack, Middleman attack, Man-in-the-Middle 
In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM, MiM attack, MitMA or the same using all capital letters… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
With Cyber-attacks and cyber-threats are increasing, network security needs to be seen in a new dimension. WLANs (Wireless Local… 
2018
2018
In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key… 
2012
2012
ABSTRACT Man-In-The-Middle attack is the major attack on SSL. Some of the major attacks on SSL are ARP poisoning and the phishing… 
2009
2009
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with… 
2009
2009
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more… 
2007
2007
Security protocols are widely used to provide secure communication in many critical applications such as e-commerce and defense… 
2007
2007
Many security concepts become more clear to students when operationalized in the context of a programming language. Unfortunately… 
2003
2003
The deployment of several client-server applications over the Internet and emerging networks requires the establishment of the… 
1995
1995
Unconditionallysecure authentication codes with arbitration ( A2-codes)protect against deceptions from the transmitter and the…