A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal p...
Váldodahkkit: | Eberz, S, Strohmeier, M, Wilhelm, M, Martinovic, I |
---|---|
Eará dahkkit: | Foresti, S |
Materiálatiipa: | Journal article |
Giella: | English |
Almmustuhtton: |
Springer
2012
|
Geahča maid
-
A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols
Dahkki: Eberz, S, et al.
Almmustuhtton: (2012) -
Poster: Detecting False−Data Injection Attacks on Air Traffic Control Protocols
Dahkki: Strohmeier, M, et al.
Almmustuhtton: (2014) -
Biometric backdoors: a poisoning attack against unsupervised template updating
Dahkki: Lovisotto, G, et al.
Almmustuhtton: (2020) -
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Dahkki: Zhiqiang YAO, et al.
Almmustuhtton: (2021-08-01) -
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Dahkki: Zhiqiang YAO, et al.
Almmustuhtton: (2021-08-01)