共 50 条
- [24] Analyzing the technique of a man-in-the-middle attack based on Bluetooth Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
- [25] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
- [26] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
- [27] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution 2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
- [28] Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack 2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, : 188 - 192
- [29] Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing 2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 64 - 68
- [30] A framework for the analysis of self-confirming policies Theory and Decision, 2022, 92 : 455 - 512