共 50 条
[32]
Bluetooth Man-In-The-Middle Attack Based on Secure Simple Pairing using Out of Band Association Model
[J].
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1,
2009,
:353-+
[34]
Dealing with the Secure Time Synchronization and Man-in-the-Middle Attacker in Mobile Sensor Networks
[J].
PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE,
2012,
[35]
Detection and Analysis Against Linear Deception Attacks via Watermarking Strategy
[J].
2023 IEEE 2ND INDUSTRIAL ELECTRONICS SOCIETY ANNUAL ON-LINE CONFERENCE, ONCON,
2023,
[36]
Secure Smartphone-Based NFC Payment to Prevent Man-in-the-Middle Attack
[J].
2019 INTERNATIONAL CONFERENCE ON INFORMATICS, MULTIMEDIA, CYBER AND INFORMATION SYSTEM (ICIMCIS),
2019,
:109-114