A Study on different flavours of securing shared data with user revocation

Authors

  • Irfaan khan and Md Shafiullah M.Tech Scholar, Dept. of CSE, Shadan College of Engineering & Technology ; Professor and Head, Shadan College of Engineering & Technology

Abstract

used to create a connection between two clients or web service which is secure and stable. Man in the middle attack allows the attacker to gain unauthorized entry into the connection between two devices and listen to the network traffic. This type of attack is very ruinous because it is almost unseen to the victim device. This survey paper on man in the middle attack focuses on the execution of man in the middle attack on d-Helman and what are the different methods with which it can be performed and the various defenses against the attack.
Index Terms: Man-In-The-Middle (MITM) attack, MITM defense techniques, MITM classification, and security

Downloads

Published

2017-08-30

How to Cite

Md Shafiullah, I. khan and. (2017). A Study on different flavours of securing shared data with user revocation. International Journal of Engineering Technology and Computer Research, 5(4). Retrieved from https://ijetcr.org/index.php/ijetcr/article/view/408

Issue

Section

Articles