共 50 条
- [31] Man-in-the-middle attack on quantum secure communications with authentication Quantum Information Processing, 2014, 13 : 917 - 923
- [34] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
- [36] An active detecting method against SYN flooding attack 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 709 - 715
- [37] An Effective Defense Against SYN Flooding Attack in SDN 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 369 - 371
- [38] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
- [39] Analyzing the technique of a man-in-the-middle attack based on Bluetooth Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
- [40] Blockchain-Based Man-in-the-Middle (MITM) Attack Detection for Photovoltaic Systems 2021 IEEE DESIGN METHODOLOGIES CONFERENCE (DMC), 2021,