The cyber crime threat on mobile devices
暂无分享,去创建一个
[1] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[2] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, CRYPTO.
[3] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[4] Christof Paar,et al. KeeLoq and Side-Channel Analysis-Evolution of an Attack , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[5] Christof Paar,et al. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed , 2009, AFRICACRYPT.
[6] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[7] Christof Paar,et al. Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.
[8] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[9] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[10] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[11] Benedikt Driessen. Eavesdropping on Satellite Telecommunication Systems , 2012, IACR Cryptol. ePrint Arch..
[12] Christof Paar,et al. Security of Wireless Embedded Devices in the Real World , 2012 .