共 50 条
- [31] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8
- [35] Quantum man-in-the-middle attack on the calibration process of quantum key distribution SCIENTIFIC REPORTS, 2018, 8
- [37] Man-in-the-Middle Attack and Its Countermeasure in Bluetooth Secure Simple Pairing COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 367 - 376
- [38] Man-in-the-middle Attack on BB84 Protocol and its Defence 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
- [39] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack Journal of Cryptology, 2002, 15 : 139 - 148
- [40] Man-In-The-Middle attacks on Bluetooth:: A comparative analysis, a novel attack, and countermeasures 2008 3RD INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING, VOLS 1-3, 2008, : 1096 - 1102