共 50 条
[41]
On locating Byzantine attackers
[J].
2008 FOURTH WORKSHOP ON NETWORK CODING, THEORY, AND APPLICATIONS: NETCOD 2008, PROCEEDINGS,
2008,
:62-67
[43]
Honeypots and the Attackers Bias
[J].
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018),
2018,
:533-542
[47]
SPACE PROCESSED HORMONE FOUND CONTAMINATED, UNUSABLE
[J].
AVIATION WEEK & SPACE TECHNOLOGY,
1984, 121 (20)
:19-21
[50]
Blockwise-adaptive attackers - Revisiting the (In)security of some provably secure encryption modes: CBC, GEM, IACBC
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS,
2002, 2442
:17-30