共 21 条
[1]
Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781
[2]
Ben-Sasson E, 2013, LECT NOTES COMPUT SC, V8043, P90, DOI 10.1007/978-3-642-40084-1_6
[3]
Bitansky N, 2013, LECT NOTES COMPUT SC, V7785, P315, DOI 10.1007/978-3-642-36594-2_18
[4]
Towards Better Availability and Accountability for IoT Updates by means of a Blockchain
[J].
2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW),
2017,
:50-58
[5]
Buterin V., 2014, NEXT GENERATION SMAR, P36
[6]
Cirani S, 2015, IEEE INT CONF SENS, P43
[7]
A Comprehensive Symbolic Analysis of TLS 1.3
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1773-1788
[8]
Gennaro R, 2013, LECT NOTES COMPUT SC, V7881, P626, DOI 10.1007/978-3-642-38348-9_37
[9]
He X., 2019, P INT C OMN INT SYST, P164
[10]
Hernndez-Ramos J.L., 2020, 2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), P1, DOI 10.1109/GIOTS49054.2020.9119514