Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Man-in-the-middle attack

Known as: Credential forwarding attack, Middleman attack, Man-in-the-Middle 
In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM, MiM attack, MitMA or the same using all capital letters… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
In this letter, an enhanced version of Address Resolution Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We propose two new Man-In-The-Middle (MITM) attacks on Bluetooth Secure Simple Pairing (SSP). The attacks are based on the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e… Expand
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Self-signed certificates for SSL and self-generated hosts keys for SSH are popular zero-cost, simple alternatives to public key… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2009
2009
TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate… Expand
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In Crypto'05, Juels and Weis proposed an efficient and provably secure authentication protocol for RFID devices, namely HB… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • Y. Desmedt
  • Encyclopedia of Cryptography and Security
  • 2005
  • Corpus ID: 42742895
A leg exercising device having a general frame having an L-shaped seat for supporting the body and a pair of leg gripping frames… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
  • D. Kügler
  • Financial Cryptography
  • 2003
  • Corpus ID: 40811357
Bluetooth is a short range wireless communication technology that has been designed to eliminate wires between both stationary… Expand
Is this relevant?
2002
2002
In the analysis of many cryptographie protocole, it is useful to distinguish two classes of attacks: passive attacks in which an… Expand
  • figure 1.1
  • figure 3.1
  • figure 3.2
  • figure 3.3
  • figure 3.4
Is this relevant?