共 50 条
- [31] Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 491 - 495
- [34] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
- [35] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8
- [39] Quantum man-in-the-middle attack on the calibration process of quantum key distribution SCIENTIFIC REPORTS, 2018, 8
- [40] Man-in-the-middle Attack on BB84 Protocol and its Defence 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434