Powerless Security

[1]  Christian Wressnegger,et al.  Security Analysis of Devolo HomePlug Devices , 2019, EuroSec@EuroSys.

[2]  Ivan Martinovic,et al.  EMPower: Detecting Malicious Power Line Networks from EM Emissions , 2018, SEC.

[3]  Khairi Ashour Hamdi,et al.  Physical Layer Security Over Correlated Log-Normal Cooperative Power Line Communication Channels , 2017, IEEE Access.

[4]  Blase Ur,et al.  Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.

[5]  Cristina Cano,et al.  State of the Art in Power Line Communications: From the Applications to the Medium , 2016, IEEE Journal on Selected Areas in Communications.

[6]  Fernando Baptista Leal Alves,et al.  Vulnerability discovery in power line communications , 2015 .

[7]  Salvatore J. Stolfo,et al.  When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.

[8]  Tim Güneysu,et al.  Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms , 2012, ESORICS.

[9]  Joseph Bonneau,et al.  The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.

[10]  Sunguk Lee Security Issues of Power Line Multi-Home Networks for Seamless Data Transmission , 2011 .

[11]  Dawn Xiaodong Song,et al.  Towards a Formal Foundation of Web Security , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.

[12]  N. Asokan,et al.  Standards for security associations in personal networks: a comparative analysis , 2009, Int. J. Secur. Networks.

[13]  Collin Jackson,et al.  Robust defenses for cross-site request forgery , 2008, CCS.

[14]  A. Durresi,et al.  Securing powerline communications , 2008, 2008 IEEE International Symposium on Power Line Communications and Its Applications.

[15]  R. Newman,et al.  HomePlug AV Security Mechanisms , 2007, 2007 IEEE International Symposium on Power Line Communications and Its Applications.

[16]  Ross J. Anderson,et al.  Protecting domestic power-line communications , 2006, SOUPS '06.

[17]  Frank Adelstein,et al.  Malicious code detection for open firmware , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[18]  Burton S. Kaliski,et al.  PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.

[19]  Sarvar Patel,et al.  Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.