共 50 条
- [41] The security flaws in some authentication watermarking schemes 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 493 - 496
- [42] SoK: Autonomic Computing based Methods for ICS/SCADA and IIoT Security 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 807 - 812
- [44] Security flaws in a recent RFID delegation protocol Personal and Ubiquitous Computing, 2012, 16 : 337 - 349
- [45] SUPPORTING SECURITY TESTERS IN DISCOVERING INJECTION FLAWS TACI PART 2008:TESTING: ACADEMIC AND INDUSTRIAL CONFERENCE PRACTICE AND RESEARCH TECHNIQUES, PROCEEDINGS, 2008, : 64 - 68
- [47] On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems Journal of Medical Systems, 2015, 39
- [48] Security Flaws and Improvement of A Cloud-Based Authentication Protocol for RFID Supply Chain Systems PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 487 - 491
- [50] SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems PROCEEDINGS OF THE 18TH USENIX WOOT CONFERENCE ON OFFENSIVE TECHNOLOGIES, WOOT 2024, 2024, : 149 - 169