-
4
-
-
84928553068
-
Penetration Testing and Network Auditing: Linux
-
Stiawan, D.; Idris, M.Y.; Abdullah, A.H. Penetration Testing and Network Auditing: Linux. JIPS 2015, 11, 104-115.
-
(2015)
JIPS
, vol.11
, pp. 104-115
-
-
Stiawan, D.1
Idris, M.Y.2
Abdullah, A.H.3
-
7
-
-
84910621255
-
-
(accessed on 23 August 2016)
-
Miller, C. Battery Firmware Hacking. Available online: http://www.hakim.ws/BHUS2011/materials/Miller/BH_US_11_Miller_Battery_Firmware_Public_WP.pdf (accessed on 23 August 2016).
-
Battery Firmware Hacking
-
-
Miller, C.1
-
8
-
-
84964317984
-
Secure firmware validation and update for consumer devices in home networking
-
Choi, B.C.; Lee, S.H.; Na, J.C.; Lee, J.H. Secure firmware validation and update for consumer devices in home networking. IEEE Trans. Consum. Electron. 2016, 62, 39-44.
-
(2016)
IEEE Trans. Consum. Electron
, vol.62
, pp. 39-44
-
-
Choi, B.C.1
Lee, S.H.2
Na, J.C.3
Lee, J.H.4
-
10
-
-
84865586926
-
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties
-
Springer: Berlin, Germany
-
Dacosta, I.; Ahamad, M.; Traynor, P. Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. In Computer Security-ESORICS 2012; Springer: Berlin, Germany, 2012; pp. 199-216.
-
(2012)
Computer Security-ESORICS 2012
, pp. 199-216
-
-
Dacosta, I.1
Ahamad, M.2
Traynor, P.3
-
11
-
-
84940393598
-
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications
-
San Diego, CA, USA, 20-22 August
-
Karapanos, N.; Capkun, S. On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14) 2014, San Diego, CA, USA, 20-22 August 2014; pp. 671-686.
-
(2014)
Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14) 2014
, pp. 671-686
-
-
Karapanos, N.1
Capkun, S.2
-
12
-
-
84975709552
-
Firmware over the Air Ad-Hoc Network, FOTANET
-
Dekalb, IL, USA, 21-23 May
-
Odat, H.A.; Nsour, A.; Ganesan, S. Firmware over the Air Ad-Hoc Network, FOTANET. In Proceedings of the 2015 IEEE International Conference on Electro/Information Technology (EIT), Dekalb, IL, USA, 21-23 May 2015; pp. 101-106.
-
(2015)
Proceedings of the 2015 IEEE International Conference on Electro/Information Technology (EIT)
, pp. 101-106
-
-
Odat, H.A.1
Nsour, A.2
Ganesan, S.3
-
14
-
-
84969142629
-
Secure Firmware Updates for Point of Sale Terminals
-
24-25 March 2015; Academic Conferences Limited: Sonning Common, UK
-
Tsague, H.D.; Van Der Merwe, J.; Moabalobelo, T. Secure Firmware Updates for Point of Sale Terminals. In Proceedings of the 10th International Conference on CyberWarfare and Security, Kruger National Park, South Africa, 24-25 March 2015; Academic Conferences Limited: Sonning Common, UK, 2015; p. 337.
-
(2015)
Proceedings of the 10th International Conference on CyberWarfare and Security, Kruger National Park, South Africa
, pp. 337
-
-
Tsague, H.D.1
Van Der Merwe, J.2
Moabalobelo, T.3
-
15
-
-
69249177542
-
-
McGraw-Hill Education: New York, NY, USA
-
Forouzan, B.A.; Mukhopadhyay, D. Cryptography and Network Security (Sie.); McGraw-Hill Education: New York, NY, USA, 2011; pp. 2-7, 507-548.
-
(2011)
Cryptography and Network Security (Sie.)
-
-
Forouzan, B.A.1
Mukhopadhyay, D.2
-
16
-
-
84960408576
-
Applicability of IEEE 802.11s for Automotive Wireless Software Updates
-
Graz, Austria, 13-15 July
-
Steger, M.; Karner, M.; Hillebrand, J.; Rom, W.; Armengaud, E.; Hansson, M.; Boano, C.A.; Römer, K. Applicability of IEEE 802.11s for Automotive Wireless Software Updates. In Proceedings of the 13th International Conference on Telecommunications (ConTEL) 2015, Graz, Austria, 13-15 July 2015; pp. 1-8.
-
(2015)
Proceedings of the 13th International Conference on Telecommunications (ConTEL) 2015
, pp. 1-8
-
-
Steger, M.1
Karner, M.2
Hillebrand, J.3
Rom, W.4
Armengaud, E.5
Hansson, M.6
Boano, C.A.7
Römer, K.8
-
23
-
-
84924540364
-
Analyzis of covert hardware attacks
-
Moein, S.; Gebali, F.; Traore, I. Analyzis of covert hardware attacks. J. Converg. 2014, 5, 26-30.
-
(2014)
J. Converg
, vol.5
, pp. 26-30
-
-
Moein, S.1
Gebali, F.2
Traore, I.3
-
25
-
-
31344439511
-
-
(accessed on 23 August 2016)
-
Burkholder, P. SSL Man-in-the-Middle Attacks. Available online: http://www.windowsecurity.com/articlestutorials/authentication_and_encryption/Understanding-Man-in-the-Middle-Attacks-ARP-Part4.html (accessed on 23 August 2016).
-
SSL Man-in-the-Middle Attacks
-
-
Burkholder, P.1
-
26
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
Ellison, C.; Schneier, B. Ten risks of PKI: What you're not being told about public key infrastructure. Comput. Secur. J. 2000, 16, 1-7.
-
(2000)
Comput. Secur. J
, vol.16
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
27
-
-
84950291360
-
How does this message make you feel? A study of user perspectives on software update/warning message design
-
Fagan, M.; Khan, M.M.H.; Nguyen, N. How does this message make you feel? A study of user perspectives on software update/warning message design. Hum. Centric Comput. Inf. Sci. 2015, 5, 1-26.
-
(2015)
Hum. Centric Comput. Inf. Sci
, vol.5
, pp. 1-26
-
-
Fagan, M.1
Khan, M.M.H.2
Nguyen, N.3
-
30
-
-
84990919879
-
-
(accessed on 23 August 2016)
-
Top 20 RatedWireless Access Points Reviews 2016. Available online: https://www.vbestreviews.com/top-10-rated-wireless-access-point-reviews-2015/(accessed on 23 August 2016).
-
-
-
-
31
-
-
84991025437
-
197: The official AES standard. Figure 2: Working scheme with four LFSRs and their IV generation LFSR1
-
FIPS. 197: The official AES standard. Figure 2: Working scheme with four LFSRs and their IV generation LFSR1. LFSR 2001, 2, 1-3.
-
(2001)
LFSR
, vol.2
, pp. 1-3
-
-
-
32
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Barbara, CA, USA, 22-26 August 1993; Springer: Berlin, Germany
-
Bellare, M.; Rogaway, P. Entity Authentication and Key Distribution. In Proceedings of the Annual International Cryptology Conference, Barbara, CA, USA, 22-26 August 1993; Springer: Berlin, Germany, 1993; pp. 232-249.
-
(1993)
Proceedings of the Annual International Cryptology Conference
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
35
-
-
0032069870
-
Key control in key agreement protocols
-
Mitchell, C.J.; Ward, M.; Wilson, P. Key control in key agreement protocols. Electron. Lett. 1998, 34, 980-981.
-
(1998)
Electron. Lett
, vol.34
, pp. 980-981
-
-
Mitchell, C.J.1
Ward, M.2
Wilson, P.3
-
36
-
-
84868107460
-
A Privacy Preserving Application Acquisition Protocol
-
Security and Privacy in Computing and Communications, Liverpool, UK, 25-27 June
-
Akram, R.N.; Markantonakis, K.; Mayes, K. A Privacy Preserving Application Acquisition Protocol. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25-27 June 2012; pp. 383-392.
-
(2012)
Proceedings of the 2012 IEEE 11th International Conference on Trust
, pp. 383-392
-
-
Akram, R.N.1
Markantonakis, K.2
Mayes, K.3
-
37
-
-
84956866842
-
-
Public Key Cryptography, Springer: Berlin, Germany
-
Blake-Wilson, S.; Menezes, A. Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol; Public Key Cryptography, Springer: Berlin, Germany, 1999; pp. 154-170.
-
(1999)
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
-
38
-
-
84917705583
-
Improving the ISO/IEC 11770 Standard for Key Management Techniques
-
London, UK, 16-17 December
-
Cremers, C.; Horvat, M. Improving the ISO/IEC 11770 Standard for Key Management Techniques. In Proceedings of the International Conference on Research in Security Standardisation, London, UK, 16-17 December 2014; pp. 215-235.
-
(2014)
Proceedings of the International Conference on Research in Security Standardisation
, pp. 215-235
-
-
Cremers, C.1
Horvat, M.2
-
40
-
-
85084162851
-
Prying Open Pandora's Box: KCI Attacks against TLS
-
Washington, DC, USA, 24 June
-
Hlauschek, C.; Gruber, M.; Fankhauser, F.; Schanes, C. Prying Open Pandora's Box: KCI Attacks against TLS. In Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT 15), Washington, DC, USA, 24 June 2015.
-
(2015)
Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT 15)
-
-
Hlauschek, C.1
Gruber, M.2
Fankhauser, F.3
Schanes, C.4
-
41
-
-
84865579512
-
X.509 Forensics: Detecting and Localizing the SSL/TLS Men-in-the-Middle
-
Springer: Berlin, Germany
-
Holz, R.; Riedmaier, T.; Kammenhuber, N.; Carle, G. X.509 Forensics: Detecting and Localizing the SSL/TLS Men-in-the-Middle. In Computer Security-Esorics 2012; Springer: Berlin, Germany, 2012; pp. 217-234.
-
(2012)
Computer Security-Esorics 2012
, pp. 217-234
-
-
Holz, R.1
Riedmaier, T.2
Kammenhuber, N.3
Carle, G.4
|