Powerless Security
暂无分享,去创建一个
Jörg Schwenk | Gerd Bumiller | Jens Müller | Stefan Hoffmann | Jens Müller | Jörg Schwenk | S. Hoffmann | G. Bumiller
[1] Christian Wressnegger,et al. Security Analysis of Devolo HomePlug Devices , 2019, EuroSec@EuroSys.
[2] Ivan Martinovic,et al. EMPower: Detecting Malicious Power Line Networks from EM Emissions , 2018, SEC.
[3] Khairi Ashour Hamdi,et al. Physical Layer Security Over Correlated Log-Normal Cooperative Power Line Communication Channels , 2017, IEEE Access.
[4] Blase Ur,et al. Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.
[5] Cristina Cano,et al. State of the Art in Power Line Communications: From the Applications to the Medium , 2016, IEEE Journal on Selected Areas in Communications.
[6] Fernando Baptista Leal Alves,et al. Vulnerability discovery in power line communications , 2015 .
[7] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.
[8] Tim Güneysu,et al. Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms , 2012, ESORICS.
[9] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[10] Sunguk Lee. Security Issues of Power Line Multi-Home Networks for Seamless Data Transmission , 2011 .
[11] Dawn Xiaodong Song,et al. Towards a Formal Foundation of Web Security , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[12] N. Asokan,et al. Standards for security associations in personal networks: a comparative analysis , 2009, Int. J. Secur. Networks.
[13] Collin Jackson,et al. Robust defenses for cross-site request forgery , 2008, CCS.
[14] A. Durresi,et al. Securing powerline communications , 2008, 2008 IEEE International Symposium on Power Line Communications and Its Applications.
[15] R. Newman,et al. HomePlug AV Security Mechanisms , 2007, 2007 IEEE International Symposium on Power Line Communications and Its Applications.
[16] Ross J. Anderson,et al. Protecting domestic power-line communications , 2006, SOUPS '06.
[17] Frank Adelstein,et al. Malicious code detection for open firmware , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[18] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.
[19] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.