Login / Signup
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals.
Gergely Alpár
Jaap-Henk Hoepman
Published in:
PrimeLife (2011)
Keyphrases
</>
countermeasures
traffic analysis
malicious attacks
public space
data mining
multiscale
model checking
information security
computer security
security risks