共 50 条
- [2] Preventing Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Protocol 2015 22ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2015, : 204 - 208
- [3] Optimal Man-In-The-Middle Stealth Attack CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
- [4] Man-in-the-Middle Attack in HTTP/2 PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
- [6] An example of peer-to-peer network surveillance systems preventing man-in-the-middle attack 2024 5TH INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKS AND INTERNET OF THINGS, CNIOT 2024, 2024, : 650 - 654
- [7] Modeling of Man-in-the-Middle Attack in the Wireless Networks 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
- [9] On the Security of HB# against a Man-in-the-Middle Attack ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
- [10] Self-confirming immigration policy OXFORD ECONOMIC PAPERS-NEW SERIES, 2016, 68 (02): : 361 - 378