(1. School of Software Engineering, Beijing University of Technology, Beijing 100124, China;
2. Low Carbon Research Center, Beijing Development Area Co., Ltd., Beijing 100176, China)
(1. School of Software Engineering, Beijing University of Technology, Beijing 100124, China;
2. Low Carbon Research Center, Beijing Development Area Co., Ltd., Beijing 100176, China)
Luo Peng, Zhu Yue-fei. Security of Windows RDP protocol [J]. Computer Engineering, 2007, 33(20):145-147 (in Chinese).
[2]
Guo Hao, Guo Tao. A method of man-in-t he-middle attack based on ARP spoofing [J]. Information Security and Communications Privacy, 2005, 10(1): 66-68(in Chinese).
[3]
Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems [J].Lecture Notes in Computer Science, 1987, 263: 186-194.
[4]
Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.