共 50 条
- [21] Breaking and Fixing Destructive Code Read Defenses 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 55 - 67
- [23] Breaking and Fixing Cryptophia's Short Combiner CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 50 - +
- [24] Breaking and fixing public-key Kerberos ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 167 - +
- [25] Breaking and Fixing Content-Based Filtering PROCEEDINGS OF THE 2017 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2017, : 52 - 56
- [27] Sigforgery: Breaking and Fixing Data Authenticity in Sigfox FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 331 - 350
- [28] Phylogenetic Analysis Using an SMV Tool 5TH INTERNATIONAL CONFERENCE ON PRACTICAL APPLICATIONS OF COMPUTATIONAL BIOLOGY & BIOINFORMATICS (PACBB 2011), 2011, 93 : 167 - 174
- [30] Verifying and fixing Password Authentication Protocol SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 324 - +