共 50 条
- [1] Design of Authentication Protocols Preventing Replay Attacks [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
- [2] Algebraic Replay Attacks on Authentication in RFID Protocols [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [3] Preventing Replay Attacks on Speaker Verification Systems [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
- [4] Relay attacks on Bluetooth authentication and solutions [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2004, PROCEEDINGS, 2004, 3280 : 278 - 288
- [5] Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication [J]. 2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,
- [6] Preventing replay attacks for secure routing in ad hoc networks [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 140 - 150
- [8] Permutation-Based Biometric Authentication Protocols for Mitigating Replay Attacks [J]. 2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
- [9] Modified RAP-WOTA for Preventing Man in the Middle and Replay Attacks [J]. 2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 73 - 78
- [10] PIVOT: Private and Effective Contact Tracing [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22466 - 22489