共 50 条
- [1] Mobile Authentication Secure Against Man-In-The-Middle Attacks [J]. 9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
- [3] Taxonomy of Man-in-the-Middle Attacks on HTTPS [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 527 - 534
- [4] Impact of Man-In-The-Middle Attacks on Ethereum [J]. 2018 IEEE 37TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2018, : 11 - 20
- [5] Monitoring WLANs for man-in-the-middle attacks [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2004, : 210 - 215
- [6] Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation [J]. SYMMETRY-BASEL, 2022, 14 (08):
- [7] Resilient Control in the Presence of Man-in-the-Middle Attacks [J]. 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 4553 - 4560
- [9] Detecting Man-in-the-Middle Attacks by Precise Timing [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 81 - +
- [10] Discovering man-in-the-middle attacks in authentication protocols [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3654 - 3660