How to Detect and Avoid Man-In-The-Middle Attack by Using Multiple Channels
碩士 === 國立高雄應用科技大學 === 資訊工程系 === 104 === With the increasing popularity of mobile devices, more and more security issues arise. In particular, malicious hot-spots can be easily set-up by hackers (even amateurs) and be placed in public places. Even, if the transmitted data are encrypted, they are stil...
Main Authors: | JHUANG, KUN-LIN, 莊昆霖 |
---|---|
Other Authors: | HSIAO CHUN-YUAN |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/d6r6rc |
Similar Items
-
Campus Network Design and Man-In-The-Middle Attack
by: Nazari, Mahmood, et al.
Published: (2014) -
Intrusion Detection Systems for Preventing Blackhole Attacks and Wormhole Attacks in Mobile Ad hoc Networks
by: Kun-Lin Chieng, et al.
Published: (2009) -
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
by: Wang, Le
Published: (2013) -
Man in the middle attack on HTTPS protocol
by: Dragoș Glăvan
Published: (2020-06-01) -
Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency
by: Yaoqi Yang, et al.
Published: (2020-01-01)