共 50 条
- [33] Two practical attacks against Bluetooth security using new enhanced implementations of security analysis tools Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2005, : 13 - 18
- [35] Security Risks in Deep Learning Implementations 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 123 - 128
- [36] Verified Interoperable Implementations of Security Protocols ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 31 (01):
- [37] A New Security Metric for SOA Implementations 2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 103 - 109
- [38] On the Security of Partially Masked Software Implementations 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 492 - 499
- [39] Security management: Targets, essentials and implementations ADVANCES AND INNOVATIONS IN SYSTEMS, COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2007, : 211 - +
- [40] Verifying Implementations of Security Protocols by Refinement VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +