Publisher
Springer International Publishing
Reference14 articles.
1. Lecture Notes in Computer Science;R Benadjila,2015
2. Benadjila, R., Calderon, T., Daubignard, M.: Source code for Caml Crush (2016).
https://github.com/ANSSI-FR/caml-crush
. Accessed 19 Oct 2016
3. Bond, M., Anderson, R.J.: API-level attacks on embedded systems. IEEE Comput. 34(10), 67–75 (2001)
4. Bortolozzo, M., Centenaro, M., Focardi, R., Steel, G.: Attacking and fixing PKCS#11 security tokens. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, 4–8 October 2010, pp. 260–269 (2010)
5. Cachin, C., Chandran, N.: A secure cryptographic token interface. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, 8–10 July 2009, pp. 141–153 (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Formally Verified Configuration for Hardware Security Modules in the Cloud;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
2. Secure Key Management Policies in Strand Spaces;Protocols, Strands, and Logic;2021