Inproceedings,

Vulnerability analysis of secure USB: based on the fingerprint authentication of product B.

, , , and .
RACS, page 167-169. ACM, (2018)

Meta data

Tags

Users

  • @dblp

Comments and Reviews