Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity

Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability—referred to as the CIA triad. While confiden...

Full description

Bibliographic Details
Main Authors: James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman
Format: Article
Language:English
Published: MDPI AG 2018-12-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/2/4/38