Can MPTCP secure Internet communications from man-in-the-middle attacks?
Ho Dac Duy NguyenChi-Dung PhungStefano SecciBenevid Felix SilvaMichele NogueiraPublished in: CNSM (2017)
Keyphrases
- security mechanisms
- security issues
- security protocols
- resource constrained
- cryptographic protocols
- secure routing
- stream cipher
- security threats
- chosen plaintext
- security flaws
- cryptographic algorithms
- security measures
- security requirements
- access control
- countermeasures
- internet users
- operating system
- smart card
- communication channels
- communication technologies
- communication systems
- information leakage
- watermarking technique
- electronic payment
- lightweight
- remote user authentication scheme