共 50 条
- [1] On the Security of HB# against a Man-in-the-Middle Attack ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
- [2] Defending Against Man-In-The-Middle Attack in Repeated Games PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748
- [3] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
- [4] An detection algorithm for ARP man-in-the-middle attack based on data packet forwarding behavior characteristics PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1599 - 1604
- [5] Research on User Authentication Scheme against the Man-in-the-Middle Attack INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
- [6] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
- [7] Analyzing the technique of a man-in-the-middle attack based on Bluetooth Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
- [8] Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 103 - 110
- [9] Optimal Man-In-The-Middle Stealth Attack CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
- [10] Man-in-the-Middle Attack in HTTP/2 PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,