共 50 条
- [22] Modeling of Man-in-the-Middle Attack in the Wireless Networks [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
- [23] Using JPCAP to prevent man-in-the-middle attacks in a local area network environment [J]. Fayyaz, F. (faheem.fayyaz@hotmail.com), 2012, Institute of Electrical and Electronics Engineers Inc. (31):
- [24] Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 103 - 110
- [25] On the Security of HB# against a Man-in-the-Middle Attack [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
- [27] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
- [29] Man-in-the-middle attack on quantum secure communications with authentication [J]. Quantum Information Processing, 2014, 13 : 917 - 923
- [30] Defending Against Man-In-The-Middle Attack in Repeated Games [J]. PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748