共 50 条
- [1] Man-in-the-Middle Attack to the HTTPS Protocol [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
- [2] Improvement of Key Exchange Protocol to prevent Man-in-the-middle Attack in the Satellite Environment [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 408 - 413
- [3] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack [J]. 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
- [4] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
- [5] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
- [6] Man-in-the-middle Attack on BB84 Protocol and its Defence [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
- [7] Man-in-the-Middle Attack in HTTP/2 [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
- [8] Secure Smartphone-Based NFC Payment to Prevent Man-in-the-Middle Attack [J]. 2019 INTERNATIONAL CONFERENCE ON INFORMATICS, MULTIMEDIA, CYBER AND INFORMATION SYSTEM (ICIMCIS), 2019, : 109 - 114
- [10] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280