Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks.
Dhia FarrahMarc DacierPublished in: SP Workshops (2021)
Keyphrases
- security protocols
- cryptographic protocols
- security flaws
- countermeasures
- real world
- malicious attacks
- denial of service attacks
- watermarking scheme
- computer security
- security mechanisms
- terrorist attacks
- digital watermarking
- communication protocol
- communication protocols
- malicious users
- security threats
- traffic analysis
- intrusion detection
- neural network