Research of man-in-the-middle attack in robust security network
暂无分享,去创建一个
[1] Valtteri Niemi,et al. Man-in-the-Middle in Tunneled Authentication Protocols , 2002 .
[2] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs , 2005, RFC.
[3] A. Johnsson,et al. Time-stamping accuracy in virtualized environments , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[4] Xian Pan,et al. Hierarchical Time-Stamp Protocol: Acquiring Reliable Time-stamp from Local Time Stamping Server , 2009, 2009 Second International Symposium on Electronic Commerce and Security.
[5] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[6] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .