共 50 条
- [21] Man in the middle attacks on Bluetooth FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 149 - 161
- [22] Impact of Man-In-The-Middle Attacks on Ethereum 2018 IEEE 37TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2018, : 11 - 20
- [23] Taxonomy of Man-in-the-Middle Attacks on HTTPS 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 527 - 534
- [24] Monitoring WLANs for man-in-the-middle attacks PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2004, : 210 - 215
- [27] DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 556 - 562
- [28] Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 47 - 52