Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
97 | Byoungcheon Lee, Kwangjo Kim |
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 389-406, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
tamper-resistant randomizer, divertible zero-knowledge proof, Electronic voting, receipt-freeness |
96 | Peter Landrock |
New PKI Protocols Using Tamper Resistant Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 1-16, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Practical PKI, Light weight digital signature, HSM |
93 | Gang Tan, Yuqun Chen, Mariusz H. Jakubowski |
Delayed and Controlled Failures in Tamper-Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 216-231, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Seok Min Yoon, Seung Wook Lee, Hongmoon Wang, Jong Tae Kim |
Encoding-Based Tamper-Resistant Algorithm for Mobile Device Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 578-581, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Mobile Device, Tamper-resistant |
80 | Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon |
Tamper Resistant Software by Integrity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 608-612, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Tamper Resistant Software, Security, Software Protection |
78 | Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya |
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 82-96, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
70 | Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo |
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 245-258, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Mixnet, Designated-verifier re-encryption proof, Tamper resistant randomizer, Electronic voting, Receipt-freeness, Re-encryption |
70 | Liqun Chen 0002, Wenbo Mao |
An Auditable Metering Scheme for Web Advertisement Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 475-485, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Auditable metering, Tamper-resistant software, Lightweight security, Web advertisement |
69 | G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
AEGIS: architecture for tamper-evident and tamper-resistant processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 17th Annual International Conference on Supercomputing, ICS 2003, San Francisco, CA, USA, June 23-26, 2003, pp. 160-171, 2003, ACM, 1-58113-733-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
software licensing, secure processors, certified execution |
69 | Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe |
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 145-158, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
62 | Tsutomu Matsumoto |
Incidence Structures for Key Sharing (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 342-353, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix |
62 | Feng Bao 0001 |
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 139-142, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
multimedia content protection, tamper-resistant hardware, watermarking technology, public key cryptography |
61 | Andrew J. Clark |
Physical Protection of Cryptographic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 83-93, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
61 | Chris Wullems, Mark Looi, Andrew J. Clark |
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 1251-1258, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Akira Matsunaga, Tsutomu Matsumoto |
Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 1-12, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Eric Brier, Helena Handschuh, Christophe Tymen |
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 16-27, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance |
53 | Mariano Ceccato, Jasvir Nagra, Paolo Tonella |
Distributing Trust Verification to Increase Application Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France, pp. 604-610, 2008, IEEE Computer Society, 978-0-7695-3089-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
remote trust, smartcard, tamper resistant |
53 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 116-130, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
52 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 |
Attacks and risk analysis for hardware supported software copy protection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 54-62, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
attack, tamper resistance, copy protection |
52 | Eli Biham, Adi Shamir |
Differential Fault Analysis of Secret Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 513-525, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
44 | Donggang Liu, Qi Dong 0001 |
Combating side-channel attacks using key management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 39-58, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
44 | Alexander Zangerl |
Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 50-57, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Youtao Zhang, Jun Yang 0002, Lan Gao |
Efficient Group KeyManagement with Tamper-resistant ISA Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 2006 IEEE International Conference on Application-Specific Systems, Architecture and Processors (ASAP 2006), 11-13 September 2006, Steamboat Springs, Colorado, USA, pp. 269-274, 2006, IEEE Computer Society, 0-7695-2682-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin |
License Protection with a Tamper-Resistant Token. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 223-237, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat |
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 25-36, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz |
Specifying and Verifying Hardware for Tamper-Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 166-, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | J. R. Nickerson, S. T. Chow, H. J. Johnson |
Tamper resistant software: extending trust into a hostile environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, October 5, 2001, pp. 64-67, 2001, ACM, 1-58113-393-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
44 | David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz |
Architectural Support for Copy and Tamper Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, 2000., pp. 168-177, 2000, ACM Press, 1-58113-317-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Helena Handschuh, Pascal Paillier, Jacques Stern |
Probing Attacks on Tamper-Resistant Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 303-315, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
42 | Moon Chan Park, Woo Kwon Koo, Dong Geun Suh, In-Seok Kim, Dong Hoon Lee 0001 |
Two-stage tamper response in tamper-resistant software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Softw. ![In: IET Softw. 10(3), pp. 81-88, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
42 | G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS 25th Anniversary ![In: ACM International Conference on Supercomputing 25th Anniversary Volume, pp. 68-70, 2014, ACM, 978-1-4503-2840-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Mitsuru Shiozaki, Takaya Kubota, Tsunato Nakai, Akihiro Takeuchi, Takashi Nishimura, Takeshi Fujino |
Tamper-resistant authentication system with side-channel attack resistant AES and PUF using MDR-ROM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: 2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015, pp. 1462-1465, 2015, IEEE, 978-1-4799-8391-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Yan Sui, Fabio Maino, Yudong Guo, Kai Wang, Xukai Zou |
An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: MSN 2009, The Fifth International Conference on Mobile Ad-hoc and Sensor Networks, Wu Yi Mountain, Fujian, China , December 14-16, 2009, pp. 279-286, 2009, IEEE Computer Society, 978-0-7695-3935-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Time-bound hierarchical key management, Dynamicity, Tamper-resistant, Hierarchical Access Control |
34 | Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee |
Memory-Centric Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. High Perform. Embed. Archit. Compil. ![In: Transactions on High-Performance Embedded Architectures and Compilers I, pp. 95-115, 2007, Springer, 978-3-540-71527-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Wil Michiels, Paul Gorissen |
Mechanism for software tamper resistance: an application of white-box cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007, pp. 82-89, 2007, ACM, 978-1-59593-884-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, white-box cryptography, software protection |
34 | Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee |
Memory-Centric Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPEAC ![In: High Performance Embedded Architectures and Compilers, First International Conference, HiPEAC 2005, Barcelona, Spain, November 17-18, 2005, Proceedings, pp. 153-168, 2005, Springer, 3-540-30317-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh |
Terra: a virtual machine-based platform for trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 193-206, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM |
34 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 216-231, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
32 | Sung-Kyoung Kim, Dong-Guk Han, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 |
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 286-295, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Radu Sion |
Strong WORM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 69-76, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 198-218, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jean-Pierre Seifert |
On authenticated computing and RSA-based authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 122-127, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authenticated computing, RSA, fault attacks, secure boot |
27 | Gildas Avoine, Etienne Dysli, Philippe Oechslin |
Reducing Time Complexity in RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 291-306, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Khaled Z. Ibrahim |
Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings, pp. 640-654, 2005, Springer, 3-540-29643-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rüdiger Weis, Bastiaan Bakker, Stefan Lucks |
Security on Your Hand: Secure Filesystems with a "Non-Cryptographic" JAVA-Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Java Card Workshop ![In: Java on Smart Cards: Programming and Security, First International Workshop, JavaCard 2000, Cannes, France, September 14, 2000, Revised Papers, pp. 151-162, 2000, Springer, 3-540-42167-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
i-Button, Remotely Keyed Encryption, tamper proof |
27 | Stefan Brands |
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 302-318, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
27 | Jianfei Sun, Junyi Tao, Hao Zhang, Yanan Zhao, Liming Nie, Xiaochun Cheng, Tianwei Zhang 0004 |
A Tamper-Resistant Broadcasting Scheme for Secure Communication in Internet of Autonomous Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 25(3), pp. 2837-2846, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Salvatore D'Antonio, Roberto Nardone, Nicola Russo, Federica Uccello |
A Tamper-Resistant Storage Framework for Smart Grid security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 31st Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2023, Naples, Italy, March 1-3, 2023, pp. 100-103, 2023, IEEE, 979-8-3503-3763-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yui Koyanagi, Tomoaki Ukezono |
A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper-resistant AES Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDARW ![In: Eleventh International Symposium on Computing and Networking, CANDAR 2023 - Workshops, Matsue, Japan, November 27-30, 2023, pp. 318-322, 2023, IEEE, 979-8-3503-0694-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Haosen Yu, Peiyao Sun, Basel Halak, Karthik Shanthakumar, Tomasz Kazmierski |
Tamper Resistant Design of Convolutional Neural Network Hardware Accelerator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsianHOST ![In: Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2023, Tianjin, China, December 13-15, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-4099-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Riaan Bezuidenhout, Wynand Nel, Jacques M. Maritz |
Embedding Tamper-Resistant, Publicly Verifiable Random Number Seeds in Permissionless Blockchain Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 39912-39925, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | M. Lavanya, V. Kavitha |
Secure Tamper-Resistant Electronic Health Record Transaction in Cloud System Via Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 124(1), pp. 607-632, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Thomas H. Austin, Fabio Di Troia |
A Blockchain-Based Tamper-Resistant Logging Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SVCC ![In: Silicon Valley Cybersecurity Conference - Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers, pp. 90-104, 2022, Springer, 978-3-031-24048-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Kathrin Garb, Johannes Obermaier, Elischa Ferres, Martin Künig |
FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 18th International Conference on Privacy, Security and Trust, PST 2021, Auckland, New Zealand, December 13-15, 2021, pp. 1-12, 2021, IEEE, 978-1-6654-0184-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Jun Shiomi, Shuya Kotsugi, Boyu Dong, Hidetoshi Onodera, Akihiko Shinya, Masaya Notomi |
Tamper-Resistant Optical Logic Circuits Based on Integrated Nanophotonics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021, pp. 139-144, 2021, IEEE, 978-1-6654-3274-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Jack Tang, Mohamed Ibrahim 0002, Krishnendu Chakrabarty, Ramesh Karri |
Synthesis of Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(1), pp. 171-184, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Fangyuan Xu, Ryo Ariizumi, Shun-Ichi Azuma, Toru Asai |
Tamper-resistant controller using neural network and time-varying quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Life Robotics ![In: Artif. Life Robotics 25(4), pp. 596-602, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Nan Zheng, Zack Ives |
Compact, Tamper-Resistant Archival of Fine-Grained Provenance. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. VLDB Endow. ![In: Proc. VLDB Endow. 14(4), pp. 485-497, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Jinwoo Ahn, Junghee Lee, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim 0001 |
DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, pp. 799-812, 2020, ACM, 978-1-4503-6750-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Akram Hakiri, Bassem Sellami, Sadok Ben Yahia, Pascal Berthou |
A Blockchain Architecture for SDN-enabled Tamper-Resistant IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIIS ![In: Global Information Infrastructure and Networking Symposium, GIIS 2020, Tunis, Tunisia, October 28-30, 2020, pp. 1-4, 2020, IEEE, 978-1-7281-8241-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Fuxiao Zhou, Haopeng Chen, Zhijian Jiang |
A Tamper-Resistant and Decentralized Service for Cloud Storage Based on Layered Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom (2) ![In: Collaborative Computing: Networking, Applications and Worksharing - 16th EAI International Conference, CollaborateCom 2020, Shanghai, China, October 16-18, 2020, Proceedings, Part II, pp. 482-493, 2020, Springer, 978-3-030-67539-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Hannah Atmer, Kilian Rausch, Daniel McNally |
ODIN: Tamper-Resistant Round Trip Time Measurement for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.09500, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
27 | Elischa Ferres, Vincent Immler, Alexander Utz, Alexander Stanitzki, Reneé Lerch, Rainer Kokozinski |
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SENSORS ![In: 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-4708-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Roland Meier, Cornelia Scherrer, David Gugelmann, Vincent Lenders, Laurent Vanbever |
FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018, pp. 321-344, 2018, IEEE, 978-9-9499-9042-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Vincent Immler, Johannes Obermaier, Martin König, Matthias Hiller, Georg Sigl |
B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018, pp. 49-56, 2018, IEEE Computer Society, 978-1-5386-4731-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Jack Tang, Mohamed Ibrahim 0002, Krishnendu Chakrabarty, Ramesh Karri |
Tamper-resistant pin-constrained digital microfluidic biochips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 55th Annual Design Automation Conference, DAC 2018, San Francisco, CA, USA, June 24-29, 2018, pp. 67:1-67:6, 2018, ACM, 978-1-5386-4114-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1712.03943, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
27 | Chenyu Wang, Guoai Xu |
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2017, pp. 1619741:1-1619741:14, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Takeshi Fujino, Takaya Kubota, Mitsuru Shiozaki |
Tamper-resistant cryptographic hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Electron. Express ![In: IEICE Electron. Express 14(2), pp. 20162004, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | M. Fahim Ferdous Khan, Ken Sakamura |
A tamper-resistant digital token-based rights management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2017, Madrid, Spain, October 23-26, 2017, pp. 1-6, 2017, IEEE, 978-1-5386-1585-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Rei Ueno, Naofumi Homma, Sumio Morioka, Takafumi Aoki |
Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27-31, 2017, pp. 978-983, 2017, IEEE, 978-3-9815370-8-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Chittaranjan Hota, Rajesh Kumar Shrivastava, Shivangi Shipra |
Tamper-resistant code using optimal ROP gadgets for IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain, June 26-30, 2017, pp. 570-575, 2017, IEEE, 978-1-5090-4372-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone |
A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: 13th European Dependable Computing Conference, EDCC 2017, Geneva, Switzerland, September 4-8, 2017, pp. 151-154, 2017, IEEE Computer Society, 978-1-5386-0602-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 75-92, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Rei Ueno, Naofumi Homma, Takafumi Aoki |
A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d + 1) Input Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMVL ![In: 47th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2017, Novi Sad, Serbia, May 22-24, 2017, pp. 136-141, 2017, IEEE Computer Society, 978-1-5090-5496-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Sharareh Zamanzadeh, Ali Jahanian 0001 |
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Int. J. Inf. Secur. ![In: ISC Int. J. Inf. Secur. 8(1), pp. 53-60, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Pelin Angin, Bharat K. Bhargava, Rohit Ranchal |
Tamper-resistant autonomous agents-based mobile-cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pp. 843-847, 2016, IEEE, 978-1-5090-0223-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Khan Ferdous Wahid, Helmut Kaufmann, Kevin Jones |
Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers, pp. 226-238, 2016, Springer, 978-3-319-71367-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Adiseshu Hari, T. V. Lakshman |
The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotNets ![In: Proceedings of the 15th ACM Workshop on Hot Topics in Networks, HotNets 2016, Atlanta, GA, USA, November 9-10, 2016, pp. 204-210, 2016, ACM, 978-1-4503-4661-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Rui Liu 0005, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu |
A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016, pp. 13-18, 2016, IEEE Computer Society, 978-1-4673-8826-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | M. Fahim Ferdous Khan, Ken Sakamura |
Tamper-Resistant Security for Cyber-Physical Systems with eTRON Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSDIS ![In: IEEE International Conference on Data Science and Data Intensive Systems, DSDIS 2015, Sydney, Australia, December 11-13, 2015, pp. 196-203, 2015, IEEE Computer Society, 978-1-5090-0214-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Z. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami |
Malware traffic detection using tamper resistant features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015, pp. 330-335, 2015, IEEE, 978-1-5090-0073-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Quoc-Cuong To |
Privacy-Preserving Query Execution using Tamper Resistant Hardware. Design and Performance Considerations. (Exécution de requêtes respectueuses de la vie privée grâce à l'utilisation de matériel sécurisé). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
27 | Norman Poh, Rita Wong, Gian Luca Marcialis |
Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIBIM ![In: 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, CIBIM 2014, Orlando, FL, USA, December 9-12, 2014, pp. 175-180, 2014, IEEE, 978-1-4799-4534-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral |
Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, Greece, March 24-28, 2014., pp. 487-498, 2014, OpenProceedings.org. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Xiangyao Yu, Christopher W. Fletcher, Ling Ren 0001, Marten van Dijk, Srinivas Devadas |
Generalized external interaction with tamper-resistant hardware with bounded information leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCSW ![In: CCSW'13, Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 23-34, 2013, ACM, 978-1-4503-2490-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Ang Mi, Weiping Wang 0003, Shigeng Zhang, Hong Song |
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings, pp. 29-39, 2013, Springer, 978-3-319-03583-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Michael Hölzl, René Mayrhofer, Michael Roland 0001 |
Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: The 11th International Conference on Advances in Mobile Computing & Multimedia, MoMM '13, Vienna, Austria, December 2-4, 2013, pp. 249, 2013, ACM, 978-1-4503-2106-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Martin Johns, Sebastian Lekies |
Tamper-Resistant LikeJacking Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings, pp. 265-285, 2013, Springer, 978-3-642-41283-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Young-Jin Kim 0001, Vladimir Kolesnikov, Marina Thottan |
TSAF: Tamper-resistant and scalable mutual authentication framework for plug-in EV charging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartGridComm ![In: IEEE Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013, pp. 444-449, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Ping Echo Zhang |
Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
27 | Jiuyuan Huo, Hong Qu, Liqun Liu |
Design and Implementation of Automatic Defensive Websites Tamper-Resistant System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. ![In: J. Softw. 7(10), pp. 2379-2386, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Masoumeh Safkhani, Nasour Bagheri, Majid Naderi |
On the Designing of a Tamper Resistant Prescription RFID Access Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 36(6), pp. 3995-4004, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-ke Jan |
A Design of Tamper Resistant Prescription RFID Access Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 36(5), pp. 2795-2801, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | |
Secure password-based remote user authentication scheme with non-tamper resistant smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 227, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
27 | Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn |
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 48-49, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Anh-Tuan Hoang, Takeshi Fujino |
Intra-masking dual-rail memory on LUT implementation for tamper-resistant AES on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 20th International Symposium on Field Programmable Gate Arrays, FPGA 2012, Monterey, California, USA, February 22-24, 2012, pp. 1-10, 2012, ACM, 978-1-4503-1155-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Ding Wang 0002, Chunguang Ma, Peng Wu |
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings, pp. 114-121, 2012, Springer, 978-3-642-31539-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Raja Naeem Akram |
A user centric security model for tamper-resistant devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|