Low-level attacks in bitcoin wallets
As with every financially oriented protocol, there has been a great interest in studying,
verifying, attacking, identifying problems, and proposing solutions for Bitcoin. Within that …
verifying, attacking, identifying problems, and proposing solutions for Bitcoin. Within that …
[图书][B] Smart Card Security: Applications, Attacks, and Countermeasures
BB Gupta, M Quamara - 2019 - taylorfrancis.com
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of
smart card technology and explores different security attacks and countermeasures …
smart card technology and explores different security attacks and countermeasures …
[HTML][HTML] Chip chop—smashing the mobile phone secure chip for fun and digital forensics
G Alendal, S Axelsson, GO Dyrkolbotn - Forensic Science International …, 2021 - Elsevier
Performing mobile phone acquisition today requires breaking—often hardware assisted—
security. In recent years, Embedded Secure Element (eSE) hardware has been introduced …
security. In recent years, Embedded Secure Element (eSE) hardware has been introduced …
Usability and security analysis of the keepkey wallet
E Almutairi, S Al-Megren - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
This paper presents an investigation of the usability and security of the hardware wallet
KeepKey 4.2. 10. A Man-in-the-Middle (MITM) attack was implemented to simulate potential …
KeepKey 4.2. 10. A Man-in-the-Middle (MITM) attack was implemented to simulate potential …
APDU-Level Attacks in PKCS#11 Devices
In this paper we describe attacks on PKCS# 11 devices that we successfully mounted by
interacting with the low-level APDU protocol, used to communicate with the device. They …
interacting with the low-level APDU protocol, used to communicate with the device. They …
康复设备数据通讯与存储的标准化研究
张杰, 严壮志, 蒋皆恢 - 中国医疗器械杂志, 2016 - zgylqxzz.xml-journal.net
随着康复需求的日益增长, 整合康复资源, 实现数据共享是完善康复一体化以及提高康复诊疗
效率的关键, 也是三级医疗康复网络构建中遇到的重要难题. 基于现有医疗设备标准及医疗数据 …
效率的关键, 也是三级医疗康复网络构建中遇到的重要难题. 基于现有医疗设备标准及医疗数据 …
The History of the DReaM Group
A Bundy - Mathematical Reasoning: The History and Impact of the …, 2021 - Springer
I describe the history of the DReaM Group (Discovery and Reasoning in Mathematics),
which I created after my arrival at the University of Edinburgh in 1971. The group has been …
which I created after my arrival at the University of Edinburgh in 1971. The group has been …
[PDF][PDF] SAFEST: Secure Actions for FTP Environment with Smart Token
Nowadays, with the wide applications of distributed systems, web-based applications, and
communications systems over the Internet for carrying data between users such as terminal …
communications systems over the Internet for carrying data between users such as terminal …
Analysis of threats and design flaws in hardware and software cryptographic systems
F Palmarini - 2019 - dspace.unive.it
In the past two decades the use of cryptography in computer systems has constantly
increased. Ranging from personal devices to critical infrastructures, cryptography is …
increased. Ranging from personal devices to critical infrastructures, cryptography is …
Analysis of low-level implementations of cryptographic protocols
AE Gkaniatsou - 2018 - era.ed.ac.uk
This thesis examines the vulnerabilities due to low-level implementation deficiencies of
otherwise secure communication protocols in smart-cards. Smart-cards are considered to be …
otherwise secure communication protocols in smart-cards. Smart-cards are considered to be …