共 50 条
- [31] A general attack model on hash-based client puzzles [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 319 - 331
- [32] Low-Cost Client Puzzles Based on Modular Exponentiation [J]. COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 679 - 697
- [33] Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 36 - 45
- [34] Next generation SCADA security: Best practices and client puzzles [J]. Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 426 - 427
- [35] Defending Battery Exhaustion Attacks on Mobile Systems [J]. 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1020 - 1025
- [38] Revisiting Assumptions for Website Fingerprinting Attacks [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 328 - 339
- [40] Revisiting Rowhammer Attacks in Embedded Systems [J]. 2019 14TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2019), 2019,