共 50 条
- [31] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack Journal of Cryptology, 2002, 15 : 139 - 148
- [32] AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 514 - 532
- [34] Analyzing the technique of a man-in-the-middle attack based on Bluetooth Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
- [35] Detecting Man-in-the-Middle Attacks by Precise Timing 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 81 - +
- [36] Resilient Control in the Presence of Man-in-the-Middle Attacks 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 4553 - 4560
- [37] Discovering man-in-the-middle attacks in authentication protocols 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3654 - 3660
- [38] Towards Securing Client-Server Connections against Man-in-the-Middle Attacks 2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 127 - 130
- [39] Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 7823 - 7830
- [40] Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks 2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 48 - 54