A hole in the security wall: ATM hacking
暂无分享,去创建一个
[1] Jeff Boleng,et al. Designing web labs for teaching security concepts , 2009 .
[2] B. Brown. 802.11: the security differences between b and i , 2003 .
[3] Bruce Schneier,et al. Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor , 1997, FSE.
[4] Wail S. Elkilani,et al. Performance of encryption techniques for real time video streaming , 2009, 2009 International Conference on Networking and Media Convergence.
[5] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[6] Juan E. Tapiador,et al. Automated design of a lightweight block cipher with Genetic Programming , 2008, Int. J. Knowl. Based Intell. Eng. Syst..
[7] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[8] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[9] Bruce Schneier,et al. Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.
[10] Bruce Schneier,et al. Cryptography, security, and the future , 1999 .
[11] Bruce Schneier,et al. Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.
[12] Boris Skoric,et al. Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions , 2009, Inf. Syst. Frontiers.