共 50 条
- [1] Taxonomy of Man-in-the-Middle Attacks on HTTPS 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 527 - 534
- [2] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
- [3] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
- [4] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
- [6] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8
- [7] Man-in-the-middle Attack on BB84 Protocol and its Defence 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
- [8] Covert Channel using Man-In-The-Middle over HTTPS 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 917 - 922
- [9] Man-in-the-Middle Attack in HTTP/2 PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
- [10] Optimal Man-In-The-Middle Stealth Attack CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59