共 50 条
- [1] Algebraic Replay Attacks on Authentication in RFID Protocols [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [2] Permutation-Based Biometric Authentication Protocols for Mitigating Replay Attacks [J]. 2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
- [3] Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 3 - 15
- [4] Replay tolerance of authentication protocols [J]. COMPUTER COMMUNICATIONS, 1995, 18 (12) : 988 - 992
- [6] Validating attacks on authentication protocols [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
- [7] A bound on attacks on authentication protocols [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
- [8] Errors in attacks on authentication protocols [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 223 - 229
- [9] Preventing Replay Attacks on Speaker Verification Systems [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
- [10] Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs [J]. SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 1 - 16