The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase anti-tamper (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2018 (15) 2019-2022 (5)
Publication types (Num. hits)
article(4) inproceedings(16)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 9 occurrences of 9 keywords

Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
43Brian Blietz, Akhilesh Tyagi Software Tamper Resistance Through Dynamic Program Monitoring. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Sun S. Chung, Gultekin Özsoyoglu Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. Search on Bibsonomy SP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
40Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
31Jeffrey Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila Using logic-based reduction for adversarial component recovery. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anti-tamper applications, circuit obfuscation, reverse engineering, intellectual property protection, hardware security
31Alex Tsow An Improved Recovery Algorithm for Decayed AES Key Schedule Images. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-tamper, decayed memory, cold-boot attack, AES, digital forensics, key schedule
31Adrian Stoica, Srinivas Katkoori "Glitch Logic" and Applications to Computing and Information Security. Search on Bibsonomy BLISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-tamper, trusted design, protection to reverse engineering, information exfiltration, stego-design, hardware vulnerabilities
31Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. Search on Bibsonomy VMSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-tamper, binding software to hardware, virtualization, software protection, physically unclonable functions
24Adnan Iftekhar, Xiaohui Cui Anti-Tamper Protection for Internet of Things System Using Hyperledger Fabric Blockchain Technology. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Ara Hur, Yeonseung Ryu Developing Anti-tamper Functionalities through Continuous Integration. Search on Bibsonomy ICIIT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Ara Hur, Jooeun Kim, Yeonseung Ryu Hiding Vulnerabilities of Internet of Things Software Using Anti-Tamper Technique. Search on Bibsonomy ICIIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Shuichi Kurabayashi Lambda Containers: A Comprehensive Anti-Tamper Framework for Games by Simulating Client Behavior in a Cloud. Search on Bibsonomy IEEE CLOUD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Avinash R. Desai, Michael S. Hsiao, Chao Wang 0001, Leyla Nazhandali, T. Simin Hall Interlocking obfuscation for anti-tamper hardware. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Hing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun A Robust Anti-tamper Protection Scheme. Search on Bibsonomy ARES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jeffrey Todd McDonald, Yong C. Kim, Daniel J. Koranek Deterministic circuit variation for anti-tamper applications. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryôichi Sasaki HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Christopher J. Clark Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. Search on Bibsonomy HOST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Roy Porter, Samuel J. Stone, Yong C. Kim, Jeffrey Todd McDonald, LaVern A. Starman Dynamic Polymorphic Reconfiguration for anti-tamper circuits. Search on Bibsonomy FPL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Gultekin Özsoyoglu, David A. Singer, Sun S. Chung Anti-Tamper Databases: Querying Encrypted Databases. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Jennifer English, David Coe, Rhonda Kay Gaede, David W. Hyde, Jeffrey H. Kulick MEMS-Assisted Cryptography for CPI Protection. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #20 of 20 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license