共 50 条
- [1] Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
- [2] Man-in-the-middle and denial of service attacks in wireless secret key generation Proceedings - IEEE Global Communications Conference, GLOBECOM, 2019,
- [3] Research on User Authentication Scheme against the Man-in-the-Middle Attack INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
- [4] Optimal Man-In-The-Middle Stealth Attack CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
- [5] Man-in-the-Middle Attack in HTTP/2 PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
- [8] Modeling of Man-in-the-Middle Attack in the Wireless Networks 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
- [9] Using SIP Identity to prevent Man-in-the-Middle Attacks on ZRTP 2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 480 - 484
- [10] On the Security of HB# against a Man-in-the-Middle Attack ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124