Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP.
Martin PetraschekThomas HoeherOliver JungHelmut HlavacsWilfried N. GanstererPublished in: J. Univers. Comput. Sci. (2008)
Keyphrases
- security threats
- security problems
- security mechanisms
- security measures
- security breaches
- computer security
- security vulnerabilities
- security protocols
- countermeasures
- security issues
- cyber attacks
- information security
- java card
- cryptographic protocols
- malicious attacks
- security risks
- security flaws
- malicious users
- usability issues
- stream cipher
- network security
- denial of service attacks
- intrusion detection
- insider attacks
- fault injection
- biometric template
- chosen plaintext
- intrusion detection and prevention
- resource constrained
- denial of service
- dos attacks
- access control
- security properties
- security requirements
- information leakage
- key management
- buffer overflow
- secure routing
- intrusion prevention
- identity theft
- security management
- statistical databases
- personal information
- defense mechanisms