Login / Signup

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals.

Gergely AlpárJaap-Henk Hoepman
Published in: PrimeLife (2011)
Keyphrases
  • countermeasures
  • traffic analysis
  • malicious attacks
  • public space
  • data mining
  • multiscale
  • model checking
  • information security
  • computer security
  • security risks