透過您的圖書館登入
IP:18.118.0.240
  • 期刊

On the Authentication of the User from the Remote Autonomous Object

並列摘要


In 2003, Novikov and Kislev proposed a scheme for an authentication of the user from the remote autonomous object. Recently Yang et al. pointed out an evidence of man-in-middle attack. In this paper we show another evidence of man-in-middle-attack. We also pointed out that reflection attack can also be framed successfully on the scheme.

被引用紀錄


Chen, Y. H. (2014). 考量多核系統下執行的模板應用程式利用動態資料搬移來消除記憶庫干擾 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2014.00139
Huang, C. Y. (2012). 利用電場調變紅外線吸收光譜研究溶劑效應對1,2-二氯乙烷構型平衡的影響 [master's thesis, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2012.00904
蔡隆宏(2007)。在人類氣管上皮細胞比較烹飪油煙中有毒成分之基因毒性〔碩士論文,中山醫學大學〕。華藝線上圖書館。https://doi.org/10.6834/CSMU.2007.00081
張鈞皓(2013)。R8CoAl3 (R = Y, La - Ho)以及RNiAl3 (R = Y, Sm - Ho) 三元稀土化合物之物性研究〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2013.01486
Lee, M. H. (2012). 利用穿透式電子顯微鏡研究稀土過渡金屬矽化物(Lu2Ir3Si5與Dy5Ir4Si10)電荷密度波之行為 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2012.02616

延伸閱讀