|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9 occurrences of 9 keywords
|
|
|
Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
43 | Brian Blietz, Akhilesh Tyagi |
Software Tamper Resistance Through Dynamic Program Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 146-163, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Sun S. Chung, Gultekin Özsoyoglu |
Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 98, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar |
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, pp. 1722-1736, 2022, IEEE, 978-1-6654-1316-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
40 | Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar |
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.09014, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
31 | Jeffrey Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila |
Using logic-based reduction for adversarial component recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1993-2000, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anti-tamper applications, circuit obfuscation, reverse engineering, intellectual property protection, hardware security |
31 | Alex Tsow |
An Improved Recovery Algorithm for Decayed AES Key Schedule Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 215-230, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anti-tamper, decayed memory, cold-boot attack, AES, digital forensics, key schedule |
31 | Adrian Stoica, Srinivas Katkoori |
"Glitch Logic" and Applications to Computing and Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BLISS ![In: 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, BLISS 2009, Edingburgh, United Kingdom, August 20-21 2009, pp. 107-112, 2009, IEEE Computer Society, 978-0-7695-3754-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anti-tamper, trusted design, protection to reverse engineering, information exfiltration, stego-design, hardware vulnerabilities |
31 | Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice |
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMSec ![In: Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008, pp. 45-48, 2008, ACM, 978-1-60558-298-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-tamper, binding software to hardware, virtualization, software protection, physically unclonable functions |
24 | Adnan Iftekhar, Xiaohui Cui |
Anti-Tamper Protection for Internet of Things System Using Hyperledger Fabric Blockchain Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.07074, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | Ara Hur, Yeonseung Ryu |
Developing Anti-tamper Functionalities through Continuous Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIIT ![In: ICIIT 2020: 5th International Conference on Intelligent Information Technology, Hanoi, Vietnam, February 19-22, 2020, pp. 34-38, 2020, ACM, 978-1-4503-7659-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ara Hur, Jooeun Kim, Yeonseung Ryu |
Hiding Vulnerabilities of Internet of Things Software Using Anti-Tamper Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIIT ![In: Proceedings of the 2019 4th International Conference on Intelligent Information Technology, ICIIT '19, Da Nang, Vietnam, February 20-23, 2019, pp. 46-50, 2019, ACM, 978-1-4503-6633-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Shuichi Kurabayashi |
Lambda Containers: A Comprehensive Anti-Tamper Framework for Games by Simulating Client Behavior in a Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2-7, 2018, pp. 598-605, 2018, IEEE Computer Society, 978-1-5386-7235-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Avinash R. Desai, Michael S. Hsiao, Chao Wang 0001, Leyla Nazhandali, T. Simin Hall |
Interlocking obfuscation for anti-tamper hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013, pp. 8, 2013, ACM, 978-1-4503-1687-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Hing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun |
A Robust Anti-tamper Protection Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 109-118, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jeffrey Todd McDonald, Yong C. Kim, Daniel J. Koranek |
Deterministic circuit variation for anti-tamper applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011, pp. 68, 2011, ACM, 978-1-4503-0945-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryôichi Sasaki |
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Forensics Secur. Law ![In: J. Digit. Forensics Secur. Law 5(2), pp. 21-34, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Christopher J. Clark |
Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, USA, pp. 19-24, 2010, IEEE Computer Society, 978-1-4244-7810-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Roy Porter, Samuel J. Stone, Yong C. Kim, Jeffrey Todd McDonald, LaVern A. Starman |
Dynamic Polymorphic Reconfiguration for anti-tamper circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: 19th International Conference on Field Programmable Logic and Applications, FPL 2009, August 31 - September 2, 2009, Prague, Czech Republic, pp. 493-497, 2009, IEEE, 978-1-4244-3892-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Gultekin Özsoyoglu, David A. Singer, Sun S. Chung |
Anti-Tamper Databases: Querying Encrypted Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA, pp. 133-146, 2003, Kluwer/Springer, 1-4020-8069-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Jennifer English, David Coe, Rhonda Kay Gaede, David W. Hyde, Jeffrey H. Kulick |
MEMS-Assisted Cryptography for CPI Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 14-21, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #20 of 20 (100 per page; Change: )
|
|