共 11 条
[1]
COOIJMANS T, 2014, P 4 ANN WORKSH SEC P
[3]
Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
[4]
Karayumak F., 2011, 2011 Workshop on Socio-Technical Aspects in Security and Trust, P37, DOI 10.1109/STAST.2011.6059254
[5]
Picking virtual pockets using relay attacks on contactless smartcard systems
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:47-58
[6]
ORTIZYEPES D, 2014, COMPUTER FRAUD SECUR
[7]
Roland M, 2013, ELEKTROTECH INFORMAT, V130, P201, DOI 10.1007/s00502-013-0157-x
[8]
Schneider S., 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, P56, DOI 10.1109/REVOTE.2011.6045916
[9]
Schurmann C., 2014, 1 DEMTECHVEC
[10]
SILBERSCHNEIDER R, 2013, P 21 AUSTR WORKSH MI