The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Tamper-resistant (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1998 (18) 1999-2000 (16) 2001-2003 (31) 2004 (18) 2005 (16) 2006 (18) 2007 (17) 2008 (23) 2009-2010 (19) 2011-2013 (19) 2014-2017 (22) 2018-2022 (16) 2023-2024 (4)
Publication types (Num. hits)
article(38) book(1) incollection(1) inproceedings(194) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 187 occurrences of 133 keywords

Results
Found 237 publication records. Showing 237 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
97Byoungcheon Lee, Kwangjo Kim Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tamper-resistant randomizer, divertible zero-knowledge proof, Electronic voting, receipt-freeness
96Peter Landrock New PKI Protocols Using Tamper Resistant Hardware. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Practical PKI, Light weight digital signature, HSM
93Gang Tan, Yuqun Chen, Mariusz H. Jakubowski Delayed and Controlled Failures in Tamper-Resistant Software. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
89Seok Min Yoon, Seung Wook Lee, Hongmoon Wang, Jong Tae Kim Encoding-Based Tamper-Resistant Algorithm for Mobile Device Security. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Mobile Device, Tamper-resistant
80Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon Tamper Resistant Software by Integrity-Based Encryption. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Tamper Resistant Software, Security, Software Protection
78Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
70Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo Providing Receipt-Freeness in Mixnet-Based Voting Protocols. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mixnet, Designated-verifier re-encryption proof, Tamper resistant randomizer, Electronic voting, Receipt-freeness, Re-encryption
70Liqun Chen 0002, Wenbo Mao An Auditable Metering Scheme for Web Advertisement Applications. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Auditable metering, Tamper-resistant software, Lightweight security, Web advertisement
69G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas AEGIS: architecture for tamper-evident and tamper-resistant processing. Search on Bibsonomy ICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF software licensing, secure processors, certified execution
69Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
62Tsutomu Matsumoto Incidence Structures for Key Sharing (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix
62Feng Bao 0001 Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF multimedia content protection, tamper-resistant hardware, watermarking technology, public key cryptography
61Andrew J. Clark Physical Protection of Cryptographic Devices. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
61Chris Wullems, Mark Looi, Andrew J. Clark Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
59Akira Matsunaga, Tsutomu Matsumoto Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
54Eric Brier, Helena Handschuh, Christophe Tymen Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance
53Mariano Ceccato, Jasvir Nagra, Paolo Tonella Distributing Trust Verification to Increase Application Performance. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF remote trust, smartcard, tamper resistant
53Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
52Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 Attacks and risk analysis for hardware supported software copy protection systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attack, tamper resistance, copy protection
52Eli Biham, Adi Shamir Differential Fault Analysis of Secret Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
44Donggang Liu, Qi Dong 0001 Combating side-channel attacks using key management. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Abhinav Srivastava, Jonathon T. Giffin Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine introspection, attack prevention, Firewall
44Alexander Zangerl Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Youtao Zhang, Jun Yang 0002, Lan Gao Efficient Group KeyManagement with Tamper-resistant ISA Extensions. Search on Bibsonomy ASAP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin License Protection with a Tamper-Resistant Token. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz Specifying and Verifying Hardware for Tamper-Resistant Software. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44J. R. Nickerson, S. T. Chow, H. J. Johnson Tamper resistant software: extending trust into a hostile environment. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
44David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz Architectural Support for Copy and Tamper Resistant Software. Search on Bibsonomy ASPLOS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
44Helena Handschuh, Pascal Paillier, Jacques Stern Probing Attacks on Tamper-Resistant Devices. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
42Moon Chan Park, Woo Kwon Koo, Dong Geun Suh, In-Seok Kim, Dong Hoon Lee 0001 Two-stage tamper response in tamper-resistant software. Search on Bibsonomy IET Softw. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
42G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. Search on Bibsonomy ICS 25th Anniversary The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Mitsuru Shiozaki, Takaya Kubota, Tsunato Nakai, Akihiro Takeuchi, Takashi Nishimura, Takeshi Fujino Tamper-resistant authentication system with side-channel attack resistant AES and PUF using MDR-ROM. Search on Bibsonomy ISCAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
35Yan Sui, Fabio Maino, Yudong Guo, Kai Wang, Xukai Zou An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy. Search on Bibsonomy MSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Time-bound hierarchical key management, Dynamicity, Tamper-resistant, Hierarchical Access Control
34Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee Memory-Centric Security Architecture. Search on Bibsonomy Trans. High Perform. Embed. Archit. Compil. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Wil Michiels, Paul Gorissen Mechanism for software tamper resistance: an application of white-box cryptography. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, white-box cryptography, software protection
34Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee Memory-Centric Security Architecture. Search on Bibsonomy HiPEAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh Terra: a virtual machine-based platform for trusted computing. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM
34Louis C. Guillou, Jean-Jacques Quisquater A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology
32Sung-Kyoung Kim, Dong-Guk Han, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 SPA Countermeasure Based on Unsigned Left-to-Right Recodings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Radu Sion Strong WORM. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Jean-Pierre Seifert On authenticated computing and RSA-based authentication. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authenticated computing, RSA, fault attacks, secure boot
27Gildas Avoine, Etienne Dysli, Philippe Oechslin Reducing Time Complexity in RFID Systems. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Khaled Z. Ibrahim Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Rüdiger Weis, Bastiaan Bakker, Stefan Lucks Security on Your Hand: Secure Filesystems with a "Non-Cryptographic" JAVA-Ring. Search on Bibsonomy Java Card Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF i-Button, Remotely Keyed Encryption, tamper proof
27Stefan Brands Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
27Jianfei Sun, Junyi Tao, Hao Zhang, Yanan Zhao, Liming Nie, Xiaochun Cheng, Tianwei Zhang 0004 A Tamper-Resistant Broadcasting Scheme for Secure Communication in Internet of Autonomous Vehicles. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
27Salvatore D'Antonio, Roberto Nardone, Nicola Russo, Federica Uccello A Tamper-Resistant Storage Framework for Smart Grid security. Search on Bibsonomy PDP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Yui Koyanagi, Tomoaki Ukezono A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper-resistant AES Design. Search on Bibsonomy CANDARW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Haosen Yu, Peiyao Sun, Basel Halak, Karthik Shanthakumar, Tomasz Kazmierski Tamper Resistant Design of Convolutional Neural Network Hardware Accelerator. Search on Bibsonomy AsianHOST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Riaan Bezuidenhout, Wynand Nel, Jacques M. Maritz Embedding Tamper-Resistant, Publicly Verifiable Random Number Seeds in Permissionless Blockchain Systems. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27M. Lavanya, V. Kavitha Secure Tamper-Resistant Electronic Health Record Transaction in Cloud System Via Blockchain. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Thomas H. Austin, Fabio Di Troia A Blockchain-Based Tamper-Resistant Logging Framework. Search on Bibsonomy SVCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Kathrin Garb, Johannes Obermaier, Elischa Ferres, Martin Künig FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor. Search on Bibsonomy PST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Jun Shiomi, Shuya Kotsugi, Boyu Dong, Hidetoshi Onodera, Akihiko Shinya, Masaya Notomi Tamper-Resistant Optical Logic Circuits Based on Integrated Nanophotonics. Search on Bibsonomy DAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Jack Tang, Mohamed Ibrahim 0002, Krishnendu Chakrabarty, Ramesh Karri Synthesis of Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Fangyuan Xu, Ryo Ariizumi, Shun-Ichi Azuma, Toru Asai Tamper-resistant controller using neural network and time-varying quantization. Search on Bibsonomy Artif. Life Robotics The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Nan Zheng, Zack Ives Compact, Tamper-Resistant Archival of Fine-Grained Provenance. (PDF / PS) Search on Bibsonomy Proc. VLDB Endow. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Jinwoo Ahn, Junghee Lee, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim 0001 DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX. Search on Bibsonomy AsiaCCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Akram Hakiri, Bassem Sellami, Sadok Ben Yahia, Pascal Berthou A Blockchain Architecture for SDN-enabled Tamper-Resistant IoT Networks. Search on Bibsonomy GIIS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Fuxiao Zhou, Haopeng Chen, Zhijian Jiang A Tamper-Resistant and Decentralized Service for Cloud Storage Based on Layered Blockchain. Search on Bibsonomy CollaborateCom (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Hannah Atmer, Kilian Rausch, Daniel McNally ODIN: Tamper-Resistant Round Trip Time Measurement for Distributed Systems. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
27Elischa Ferres, Vincent Immler, Alexander Utz, Alexander Stanitzki, Reneé Lerch, Rainer Kokozinski Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures. Search on Bibsonomy IEEE SENSORS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Roland Meier, Cornelia Scherrer, David Gugelmann, Vincent Lenders, Laurent Vanbever FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds. Search on Bibsonomy CyCon The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Vincent Immler, Johannes Obermaier, Martin König, Matthias Hiller, Georg Sigl B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Jack Tang, Mohamed Ibrahim 0002, Krishnendu Chakrabarty, Ramesh Karri Tamper-resistant pin-constrained digital microfluidic biochips. Search on Bibsonomy DAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
27Chenyu Wang, Guoai Xu Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Takeshi Fujino, Takaya Kubota, Mitsuru Shiozaki Tamper-resistant cryptographic hardware. Search on Bibsonomy IEICE Electron. Express The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27M. Fahim Ferdous Khan, Ken Sakamura A tamper-resistant digital token-based rights management system. Search on Bibsonomy ICCST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Rei Ueno, Naofumi Homma, Sumio Morioka, Takafumi Aoki Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme. Search on Bibsonomy DATE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Chittaranjan Hota, Rajesh Kumar Shrivastava, Shivangi Shipra Tamper-resistant code using optimal ROP gadgets for IoT devices. Search on Bibsonomy IWCMC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database. Search on Bibsonomy EDCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Rei Ueno, Naofumi Homma, Takafumi Aoki A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d + 1) Input Shares. Search on Bibsonomy ISMVL The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Sharareh Zamanzadeh, Ali Jahanian 0001 Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Pelin Angin, Bharat K. Bhargava, Rohit Ranchal Tamper-resistant autonomous agents-based mobile-cloud computing. Search on Bibsonomy NOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Khan Ferdous Wahid, Helmut Kaufmann, Kevin Jones Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures. Search on Bibsonomy CRITIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Adiseshu Hari, T. V. Lakshman The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet. Search on Bibsonomy HotNets The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Rui Liu 0005, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27M. Fahim Ferdous Khan, Ken Sakamura Tamper-Resistant Security for Cyber-Physical Systems with eTRON Architecture. Search on Bibsonomy DSDIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Z. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami Malware traffic detection using tamper resistant features. Search on Bibsonomy MILCOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Quoc-Cuong To Privacy-Preserving Query Execution using Tamper Resistant Hardware. Design and Performance Considerations. (Exécution de requêtes respectueuses de la vie privée grâce à l'utilisation de matériel sécurisé). Search on Bibsonomy 2015   RDF
27Norman Poh, Rita Wong, Gian Luca Marcialis Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study. Search on Bibsonomy CIBIM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware. Search on Bibsonomy EDBT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Xiangyao Yu, Christopher W. Fletcher, Ling Ren 0001, Marten van Dijk, Srinivas Devadas Generalized external interaction with tamper-resistant hardware with bounded information leakage. Search on Bibsonomy CCSW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Ang Mi, Weiping Wang 0003, Shigeng Zhang, Hong Song Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Michael Hölzl, René Mayrhofer, Michael Roland 0001 Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. Search on Bibsonomy MoMM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Martin Johns, Sebastian Lekies Tamper-Resistant LikeJacking Protection. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Young-Jin Kim 0001, Vladimir Kolesnikov, Marina Thottan TSAF: Tamper-resistant and scalable mutual authentication framework for plug-in EV charging. Search on Bibsonomy SmartGridComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Ping Echo Zhang Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. Search on Bibsonomy 2013   RDF
27Jiuyuan Huo, Hong Qu, Liqun Liu Design and Implementation of Automatic Defensive Websites Tamper-Resistant System. Search on Bibsonomy J. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Masoumeh Safkhani, Nasour Bagheri, Majid Naderi On the Designing of a Tamper Resistant Prescription RFID Access Control System. Search on Bibsonomy J. Medical Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-ke Jan A Design of Tamper Resistant Prescription RFID Access Control System. Search on Bibsonomy J. Medical Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27 Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
27Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Anh-Tuan Hoang, Takeshi Fujino Intra-masking dual-rail memory on LUT implementation for tamper-resistant AES on FPGA. Search on Bibsonomy FPGA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Ding Wang 0002, Chunguang Ma, Peng Wu Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Raja Naeem Akram A user centric security model for tamper-resistant devices. Search on Bibsonomy 2012   RDF
Displaying result #1 - #100 of 237 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license