Inproceedings,

Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't.

, , and .
Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 19-25. Springer, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews