Author:
Nash Aleck,Studiawan Hudan,Grispos George,Choo Kim-Kwang Raymond
Publisher
Springer Nature Switzerland
Reference19 articles.
1. Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 641–644 (2009)
2. Buhov, D., Huber, M., Merzdovnik, G., Weippl, E.: Pin it! improving android network security at runtime. In: 2016 IFIP Networking Conference (IFIP Networking) and Workshops, pp. 297–305 (2016)
3. Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutorials 18(3), 2027–2051 (2016)
4. Cortesi, A., Hils, M., Kriechbaumer, T., contributors: mitmproxy: a free and open source interactive HTTPS proxy (2010). https://mitmproxy.org/ [Version 9.0]
5. Do, Q., Martini, B., Choo, K.R.: The role of the adversary model in applied security research. Comput. Secur. 81, 156–181 (2019)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Alternativa geslom – FIDO2 in Passkey;OTS 2024 Sodobne informacijske tehnologije in storitve: Zbornik 27. konference;2024-09-03