2015
DOI: 10.1016/j.jnca.2014.10.009
|View full text |Cite
|
Sign up to set email alerts
|

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 73 publications
(36 citation statements)
references
References 64 publications
0
34
0
Order By: Relevance
“…Thus, these are more difficult to be tracked. This attack would use the well-known man-in-the-middle attack [14] to acquire these message.…”
Section: Substitute Attackmentioning
confidence: 99%
“…Thus, these are more difficult to be tracked. This attack would use the well-known man-in-the-middle attack [14] to acquire these message.…”
Section: Substitute Attackmentioning
confidence: 99%
“…A portion of the HLPN model shown in Figure 3 is depicted in Figure 4, which represents the registration process of domains on the DS. ∶= sp-cr [10], sp-r [2] ∶= sp-cr [11], sp-r [3] ∶= sp-cr [12], sp-r [4] ∶= sp-cr [13], sp-r [10] ∶= sp-cr [14], sp-r [13] ∶= sp-cr [9], sp-r [25] ∶= sp-cr [24], sp-r [11] ∶= CR − REG − DID (sp-cr [17], sp-cr [10]), sp-r [12] ∶= CR − REG − SK (sp-cr [17], sp-cr [10]), sp-cr [15] ∶= sp-r [11], sp-cr [16] ∶= sp-r [12], sp-ua [1] ∶= sp-r [11], sp-ua [2] ∶= sp-r [12], Sp − Cr ′ = Sp − Cr ∪ (sp-cr [15], sp-cr [16]) ∧ Sp − R ′ = Sp − R ∪ (sp-r [1], sp-r [2], sp-r [3], sp-r [4], sp-r [10], sp-r [13], sp-r [11], sp-r [12], sp-r [25]…”
Section: Modeling and Analysis Of Xdauth Protocolmentioning
confidence: 99%
“…R (Publish) = ∀c-pub ∈ C − P ub, ∀ia-pub ∈ Ia − P ub, ∀ ds-c-pub ∈ Ds − C − P ub ia-pub [17] = ds-c-pub [6] → ds-c-pub [15] ∶= c-pub [1], ds-c-pub [17] ∶= c-pub [2], ds-c-pub [18] ∶= c-pub [3], ds-c-pub [16] ∶= c-pub [4], ds-c-pub [14] ∶= c-pub [5], ds-c-pub [19] ∶= c-pub [6], ds-c-pub [13] ∶= ia-pub [9], ds-c-pub [24] ∶= CR − CDP − ID(c-pub [2]), [15], ds-c-pub [17], ds-c-pub [18], ds-c-pub [16], ds-c-pub [14], ds-c-pub [19], ds-c-pub [13], ds-c-pub [24]) (9)…”
Section: Storesmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, when we design a software, do not forget diverse security concerns (Akhunzada et al, 2015d, Akhunzada et al, 2015a to ensure that the software design supports penetration testing (ethical hacking) against hacking (Chang and Ramachandran, 2016).…”
Section: Introductionmentioning
confidence: 99%