Author:
Boneh Dan,DeMillo Richard A.,Lipton Richard J.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Cited by
305 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mayhem: Targeted Corruption of Register and Stack Variables;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. NVM-Flip: Non-Volatile-Memory BitFlips on the System Level;Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems;2024-06-19
3. Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android;Cyber-Physical Systems;2024-05-19
4. DOMREP II;2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2024-05-06
5. (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates;Journal of Cryptology;2024-04