共 50 条
- [22] Modified RAP-WOTA for Preventing Man in the Middle and Replay Attacks [J]. 2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 73 - 78
- [23] Defending RFID authentication protocols against DoS attacks [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
- [24] Grobner Basis Attacks on Lightweight RFID Authentication Protocols [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (04): : 691 - 706
- [27] Discovering man-in-the-middle attacks in authentication protocols [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3654 - 3660
- [28] Preventing UDP Flooding Amplification Attacks with Weak Authentication [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 78 - 82
- [29] Operation Code Authentication Preventing Shoulder Surfing Attacks [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 32 - 35
- [30] Preventing Wormhole Attacks Using Physical Layer Authentication [J]. 2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,