2016
DOI: 10.1080/01611194.2015.1135487
|View full text |Cite
|
Sign up to set email alerts
|

Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario

Abstract: This article explains, demonstrates, and evaluates Chaum's protocol for detecting a man-in-the-middle (MitM) of textmessaging network communications. MitM attacks pose serious risks to many network communications. Networks often mitigate these risks with robust protocols, such as TLS, which assume some type of public-key infrastructure that provides a mechanism for the authenticated exchange of public keys. By contrast, Chaum's protocol aims to detect a MitM with minimal assumptions and technology, and in part… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 12 publications
0
0
0
Order By: Relevance