共 50 条
- [1] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280
- [2] Preventing Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Protocol [J]. 2015 22ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2015, : 204 - 208
- [3] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8
- [4] Man-in-the-Middle Attack to the HTTPS Protocol [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
- [5] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack [J]. Journal of Cryptology, 2002, 15 : 139 - 148
- [7] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack [J]. 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
- [8] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
- [9] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
- [10] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution [J]. 2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,