共 45 条
[2]
Balasch J., 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, P105, DOI 10.1109/FDTC.2011.9
[3]
Bassham L., 2010, NIST SP
[4]
Bekkers R., 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, DOI 10.1109/FDTC.2011.20
[6]
Brauer W., 1990, MONOGRAPHS THEORETIC
[8]
Carracedo JM, 2018, 2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, P23, DOI 10.1109/IoTSMS.2018.8554634
[9]
Cervesato I., 2001, PROC 16 ANN S LOGIC, V1
[10]
Modeling of Man-in-the-Middle Attack in the Wireless Networks
[J].
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15,
2007,
:2255-2258