共 50 条
- [21] Efficient Padding Oracle Attacks on Cryptographic Hardware ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 608 - 625
- [22] A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 365 - 382
- [24] A Cryptographic Keys Transfer Protocol for Secure Communicating Systems 12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 339 - 343
- [25] Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 696 - 725
- [26] Formal Verification of Cryptographic Protocol for Secure RFID System NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
- [27] A SECURE DYNAMIC CRYPTOGRAPHIC AND ENCRYPTION PROTOCOL FOR WIRELESS NETWORKS EUROCON 2009: INTERNATIONAL IEEE CONFERENCE DEVOTED TO THE 150 ANNIVERSARY OF ALEXANDER S. POPOV, VOLS 1- 4, PROCEEDINGS, 2009, : 1860 - 1865
- [29] GuardiaNN: Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware PROCEEDINGS OF THE TWENTY-THIRD ACM/IFIP INTERNATIONAL MIDDLEWARE CONFERENCE, MIDDLEWARE 2022, 2022, : 15 - 28