共 50 条
- [1] POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks? [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1958 - 1960
- [2] Secure Control Against Replay Attacks [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
- [3] Secure Networked Control Systems Against Replay Attacks Without Injecting Authentication Noise [J]. 2015 AMERICAN CONTROL CONFERENCE (ACC), 2015, : 6028 - 6033
- [5] Secure Authentication from a Weak Key, without Leaking Information [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 246 - 265
- [6] Mobile Authentication Secure Against Man-In-The-Middle Attacks [J]. 9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
- [7] Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 36 - 57
- [8] Design of Authentication Protocols Preventing Replay Attacks [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
- [9] Algebraic Replay Attacks on Authentication in RFID Protocols [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [10] Strategies against replay attacks [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 59 - 68