Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks?
Ho Dac Duy NguyenChi-Dung PhungStefano SecciBenevid Felix SilvaMichele NogueiraPublished in: CoRR (2017)
Keyphrases
- security mechanisms
- security protocols
- security issues
- cryptographic protocols
- stream cipher
- resource constrained
- chosen plaintext
- secure routing
- security threats
- communication technologies
- security requirements
- group communication
- operating system
- communication systems
- remote user authentication scheme
- smart card
- security flaws
- access control
- security measures
- traffic analysis
- block cipher
- electronic payment
- cryptographic algorithms
- authentication scheme
- communication networks
- internet users