共 50 条
- [41] Security evaluation against electromagnetic analysis at design time HLDVT'05: TENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2005, : 211 - 218
- [42] Security evaluation against electromagnetic analysis at design time CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 280 - 292
- [44] Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 16
- [46] Survey of Practical Security Frameworks for Defending SIP Based VoIP Systems against DoS/DDoS Attacks 2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
- [47] Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks A Practical Security Evaluation on FPGA CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 34 - 49
- [49] Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks IEEE ACCESS, 2021, 9 : 168193 - 168206
- [50] DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 201 - 203