共 50 条
- [41] Secret key generation based on private pilot under man-in-the-middle attack Science China Information Sciences, 2017, 60
- [42] Defense against DNS Man-In-The-Middle Spoofing WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 312 - 319
- [44] Secure Smartphone-Based NFC Payment to Prevent Man-in-the-Middle Attack 2019 INTERNATIONAL CONFERENCE ON INFORMATICS, MULTIMEDIA, CYBER AND INFORMATION SYSTEM (ICIMCIS), 2019, : 109 - 114
- [45] Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks PROVABLE SECURITY, 2010, 6402 : 18 - 34
- [46] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
- [47] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution 2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
- [48] Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack 2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, : 188 - 192
- [49] Light-Weight Solution to Defend Implantable Medical Devices Against Man-In-The-Middle Attack 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
- [50] Lightweight Digital Signature Solution to Defend Micro Aerial Vehicles Against Man-In-The-Middle Attack 2020 IEEE 23RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2020), 2020, : 92 - 97