共 50 条
- [1] Defense against DNS Man-In-The-Middle Spoofing WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 312 - 319
- [2] Defense against man-in-the-middle attack in client-server systems PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 9 - 14
- [4] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
- [5] Towards Securing Client-Server Connections against Man-in-the-Middle Attacks 2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 127 - 130
- [6] Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03): : 131 - 134
- [8] On the Security of HB# against a Man-in-the-Middle Attack ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
- [9] Mobile Authentication Secure Against Man-In-The-Middle Attacks 9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
- [10] Defending Against Man-In-The-Middle Attack in Repeated Games PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748