共 50 条
- [1] A NEW FORGERY ATTACK ON MESSAGE RECOVERY SIGNATURES [J]. Journal of Electronics(China), 2000, (03) : 234 - 237
- [2] A distributed message in message aware concurrent transmission protocol in IEEE 802.11 WLANs [J]. EURASIP Journal on Wireless Communications and Networking, 2012
- [4] An extendable-message-passing protocol with signatures based on two hard problems and its applications [J]. 2005 International Conference on Cyberworlds, Proceedings, 2005, : 93 - 100
- [6] Covert Message Channels and Attack Vectors for IEEE Precision Time Protocol [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL, AND COMMUNICATION (ISPCS), 2022,
- [7] Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks [J]. OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 506 - 509
- [8] ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 2315 - 2331
- [9] The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin [J]. BLOCKCHAIN TECHNOLOGY AND APPLICATION: SECOND CCF CHINA BLOCKCHAIN CONFERENCE (CBCC 2019), 2020, 1176 : 196 - 209
- [10] Message block design of attack-resistant security protocol based on environment binding [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 241 - +