1.
Attacks Research and Application Base on Bittorrent Protocol
针对Bittorrent协议攻击的研究与应用
2.
Attack on 4-way Handshake of 802.11i
基于802.11i的四次握手协议的攻击
3.
RDP Vulnerability Analysis and Man-In-The-Middle Attack Implementation;
RDP协议的安全性分析与中间人攻击
4.
Simulation of Two Attacking Methods for AODV Routing Protocol;
AODV路由协议两种攻击方法仿真
5.
Protocol Analysis and DoS/DDoS Detection Base on IPv6;
基于IPv6的协议解析和DoS/DDoS攻击检测
6.
IKE Protocol and Its Policies Resistant to the DoS Attack;
IKE协议及其抵御DoS攻击研究
7.
Study on Attack and Defense of ARP Protocl Spoofing;
ARP协议欺骗攻击及防御方法研究
8.
Security Analysis of HTTPS Protocol Based on MITM Attack
基于中间人攻击的HTTPS协议安全性分析
9.
Research and Design on New Internet Key Exchange Against DDoS Attacks
防御DDoS攻击的新型密钥交换协议研究
10.
IPv6 protocol for the realization of the attack tree model
面向IPv6协议的攻击树模型的实现
11.
Research on attacking method against the PXE protocol
一种针对PXE协议的网络攻击方法研究
12.
A Freshness Attack for A(0) Protocol and Improved Scheme
针对A(0)协议的新鲜性攻击及改进方案
13.
S-ARP Protocol to Prevent ARP Spoofing and Attack on Network
防止网络ARP欺骗攻击的S-ARP协议
14.
Attack Analysis of 4-way Handshake Protocol Based on 802.11i
基于802.11i的四次握手协议的攻击分析
15.
The Implementation of SSL Man-in-the-middle Attack Using OpenSSL
应用OpenSSL对SSL协议中间人攻击的实现
16.
Research on Protecting Authentication Protocols Against Denial of Service Attack and Implementation of Security Solution to Improve the Protocols;
认证协议抵御DoS攻击研究及协议改进安全方案的实现
17.
A key agreement protocol is invulnerable to passive and active attack.
已有的密钥共识协议不能抵抗主动攻击。
18.
Formal authentication based on identification of intruder role impersonate
基于攻击者的“角色冒充”的协议验证方法