共 50 条
- [23] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
- [24] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
- [26] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
- [27] Analyzing the technique of a man-in-the-middle attack based on Bluetooth Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
- [30] An Optimized Machine Learning Model for the Detection of Man-in-the-Middle Attack in Mobile Edge Computing 2024 IST-AFRICA CONFERENCE, 2024,