Evil twin and man-in-the-middle attack II
Man-in-the-middle attacks are not a new concept. However, they were not viewed as a serious threat until recent years where sophisticated versions of such attacks sent the financial industry into a flurry, introducing new initiatives such as new bank tokens to counter the onslaught of such attacks....
Saved in:
Main Author: | Loh, Jing Lun. |
---|---|
Other Authors: | Leong Peng Chor |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/52803 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Schedule randomization based countermeasures against timing attacks in real-time wireless networks
by: Samaddar, Ankita
Published: (2022) -
Detection and prevention of man-in-the-middle attack
by: Kok, Donovan Zheng Jie
Published: (2023) -
Transport layer protocol II for high bandwidth delay network
by: Mohammad Zaki Ariffin.
Published: (2009) -
Trust management for large-scale heterogeneous wireless sensor and actuator networks (II)
by: Ang, Jian Hui
Published: (2015) -
Fault-tolerant variable architecture parallel computing platform final report
by: Loh, Peter Kok Keong, et al.
Published: (2008)