Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference74 articles.
1. “Mcafee labs threats report.” https://www.mcafee.com/April2017ThreatsReport, April 2017.
2. Arghire I. St. jude medical recalls 465,000 pacemakers over security vulnerabilities. https://www.securityweek.com/st-jude-medical-recalls-465000-pacemakers-over-security-vulnerabilities, 2017.
3. Ronen E, Shamir A, Weingarten A.-O, O’Flynn C. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. In 2017 IEEE Symposium on Security and Privacy (SP),2017; pp. 195–212.
4. Kim T. W, Kim T. H, Hong S. Breaking Korea Tansit Card with Side-Channel Analysis Attack-Unauthorized recharging-, 2017.
5. Genkin D, Pachmanov, L, Pipman, I, Tromer E, Yarom Y, ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, (New York, NY, USA), p. 1626-1638, Association for Computing Machinery, 2016.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献