Publisher
Springer International Publishing
Reference23 articles.
1. Avast Security News Team, "What is credential stuffing, and why is my smart security camera vulnerable to it?". https://blog.avast.com/credential-stuffing-and-web-cams, Security News, 4 May 2019
2. Chen, L.: Recommendation for Key Derivation Using Pseudorandom Functions (Revised), NIST Special Publication 800–108, October 2009
3. Chen, J., Sun, M., Zhang, K.: Security analysis of device binding for IP-based IoT devices. In: Proceedings of 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE Computer Society, pp. 900–905 (2019)
4. Costan, V., Devadas, S.: “Intel SGX Explained", IACR Cryptology ePrint Archive, Report 2016/86 (2016)
5. Dworkin, M.: “Recommendation for Block Cipher Modes of Operation: Methods and Techniques", National Institute of Standards and Technology, NIST Special Publication 800–38A, December 2001
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献