参考文献 [1]Zhu M,Martínez S.On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks[J].IEEE Transactions on Automatic Control,2014,59(3):804-808. [2]Smith D F,Wiliem A,Lovell B C.Face Recognition on Consumer Devices:Reflections on Replay Attacks[J].IEEE Transactions on Information Forensics & Security,2015,10(4):736-745. [3]韩崇砚,张红旗,张斌,等.一种抗重放攻击的Web服务认证协议[J].计算机工程,2011,37(21):91-93. [4]Ingargiola A,Lanrena T,Bontelle R,et al.Photon-HDF5:An Open File Format for Timestamp-based Single-molecule Fluorescence Experiments[J].Biophysical Journal,2016,110(1):26. [5]陈宇琦.一种基于时间戳的无线射频重放攻击抵御方案[J].现代计算机(专业版),2012(6):24-25. (下转第128页) (上接第120页) [6]归奕红.抵御无线传感器网络中的重放攻击[J].河池学院学报,2011,31(5):61-66. [7]李磊,陈静,张志鸿.一种FPGA上防重放攻击的远程比特流更新协议的分析改进[J].计算机科学,2013,40(8):149-150. [8]Jia Y,Chen Y,Dong X,et al.Man-in-the-browser-cache:Persisting HTTPS Attacks via Browser Cache Poisoning[J].Computers & Security,2015,55:62-80. [9]Hong Y R,Kim D.Content-based Control of HTTPs Mail for Implementation of IT-convergence Security Environment[J].Journal of Intelligent Manufacturing,2014,25(2):231-239. [10]赵章界,余智华,张丙奇.HTTP协议流解析系统的设计与实现[J].计算机工程,2005,31(24):38-40. [11]Mori T,Inone T,Shimoda A,et al.Statistical Estimation of the Names of HTTPS Servers with Domain Name Graphs[J].Computer Communications,2016,94:104-113. [12]Weaver A C.Secure Sockets Layer[J].Computer,2006,39(4):88-90. [13]Cho J,Garcia-Molina H.Synchronizing a Database to Improve Freshness[J].ACM Sigmod Record,2000,29(2):117-128. [14]Yan M,Zhao L,Bao M,et al.Hydrolyzed Polyacrylamide Biodegradation and Mechanism in Sequencing Batch Biofilm Reactor[J].Bioresource Technology,2016,207:315-321. [15]Kumari S,Gupta M K,Khan M K,et al.An Improved Timestamp-based Password Authentication Scheme:Comments,Cryptanalysis,and Improvement[J].Security & Communication Networks,2015,7(11):1921-1932. 编辑刘冰 |