3

Direct Resource Hijacking in Android is Still Dangerous

Year:
2015
Language:
english
File:
PDF, 246 KB
english, 2015
10

Cryptanalysis of some signature schemes with message recovery

Year:
2005
Language:
english
File:
PDF, 145 KB
english, 2005
11

A new design method of H-plane waveguide circulator

Year:
1988
Language:
english
File:
PDF, 174 KB
english, 1988
12

A ferrite sphere Y-junction waveguide circular

Year:
1988
Language:
english
File:
PDF, 117 KB
english, 1988
14

Security analysis of a new stream cipher

Year:
2006
Language:
english
File:
PDF, 756 KB
english, 2006
15

Survey of information security

Year:
2007
Language:
english
File:
PDF, 864 KB
english, 2007
16

Black-box testing based on colorful taint analysis

Year:
2012
Language:
english
File:
PDF, 446 KB
english, 2012
17

Improved multi-pass fast correlation attacks with applications

Year:
2011
Language:
english
File:
PDF, 261 KB
english, 2011
28

Security analysis of SM2 key exchange protocol in TPM2.0

Year:
2015
Language:
english
File:
PDF, 283 KB
english, 2015
30

Formal analysis of TPM2.0 key management APIs

Year:
2014
Language:
english
File:
PDF, 1.95 MB
english, 2014
42

Practical-time related-key attack on Hummingbird-2

Year:
2015
Language:
english
File:
PDF, 319 KB
english, 2015