共 50 条
- [23] Capturing Malware Propagations with Code Injections and Code-Reuse Attacks CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1691 - 1708
- [25] Techniques for securing networks against criminal attacks IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 365 - 369
- [27] Securing Onion Routing Against Correlation Attacks APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 573 - 580
- [28] Securing AES Implementation Against Fault Attacks 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 51 - 62
- [29] Securing BioEncoded IrisCodes Against Correlation Attacks 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
- [30] Securing AES Implementation Against Fault Attacks PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 51 - 62