共 50 条
- [1] Access Control Prototype using Modified RAP-WOTA with Timestamp Protocol Based on Arduino Mega 2560 [J]. 2021 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), 2021, : 250 - 255
- [2] Preventing Replay Attacks on Speaker Verification Systems [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
- [3] Design of Authentication Protocols Preventing Replay Attacks [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
- [4] Preventing replay attacks for secure routing in ad hoc networks [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 140 - 150
- [7] Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 510 - 511
- [8] Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 3 - 15
- [9] A Survey of Man In The Middle Attacks [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
- [10] Man in the middle attacks on Bluetooth [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 149 - 161