The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase tamper-evident (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2007 (17) 2008-2012 (15) 2013-2020 (16) 2021-2023 (6)
Publication types (Num. hits)
article(14) inproceedings(39) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 31 occurrences of 27 keywords

Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
133Jong Youl Choi, Philippe Golle, Markus Jakobsson Auditable Privacy: On Tamper-Evident Mix Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tamper-evident, observer, malware, covert channel, Mix network, subliminal channel
106Wei Han, Tao Hao, Dong Zheng 0001, Kefei Chen, Xiaofeng Chen 0001 A Tamper-Evident Voting Machine Resistant to Covert Channels. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tamper-evident, receipt-free, electronic voting, covert channel
83G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas AEGIS: architecture for tamper-evident and tamper-resistant processing. Search on Bibsonomy ICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF software licensing, secure processors, certified execution
73Gene Itkis Cryptographic tamper evidence. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF evolving cryptosystems, key evolution, tamper evidence, digital signatures, exposures
67Jong Youl Choi, Philippe Golle, Markus Jakobsson Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Dominique Cansell, J. Paul Gibson, Dominique Méry Formal verification of tamper-evident storage for e-voting. Search on Bibsonomy SEFM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner 0001 Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Tal Moran, Moni Naor Basing Cryptographic Protocols on Tamper-Evident Seals. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. Search on Bibsonomy ICS 25th Anniversary The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
46Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees
40Gorka Guardiola Muzquiz, Enrique Soriano-Salvador SealFSv2: combining storage-based and ratcheting for tamper-evident logging. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
40David Koisser, Ahmad-Reza Sadeghi Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
40Aleksandar Manev Tamper-Evident Pairing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
40Li Xu, Tianyu Li 0002, Zekeriya Erkin Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism. Search on Bibsonomy BCCA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
40Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
40Enrique Soriano-Salvador, Gorka Guardiola Muzquiz SealFS: Storage-based tamper-evident logging. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
40Qian Lin 0002, Kaiyuan Yang 0003, Tien Tuan Anh Dinh, Qingchao Cai, Gang Chen 0001, Beng Chin Ooi, Pingcheng Ruan, Sheng Wang 0011, Zhongle Xie, Meihui Zhang 0001, Olafs Vandans ForkBase: Immutable, Tamper-evident Storage Substrate for Branchable Applications. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
40Qian Lin 0002, Kaiyuan Yang 0003, Tien Tuan Anh Dinh, Qingchao Cai, Gang Chen 0001, Beng Chin Ooi, Pingcheng Ruan, Sheng Wang 0011, Zhongle Xie, Meihui Zhang 0001, Olafs Vandans ForkBase: Immutable, Tamper-evident Storage Substrate for Branchable Applications. Search on Bibsonomy ICDE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
40Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates 0001, Christopher W. Fletcher, Andrew Miller, Dave Tian Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
40Vincent Immler, Karthik Uppund New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Claudia Pop, Marcel Antal, Tudor Cioara, Ionut Anghel, David Sera, Ioan Salomie, Giuseppe Raveduto, Denisa Ziu, Vincenzo Croce, Massimo Bertoncini Blockchain-Based Scalable and Tamper-Evident Solution for Registering Energy Data. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Juan Carlos Farah, Andrii Vozniuk, María Jesús Rodríguez-Triana, Denis Gillet A Blueprint for a Blockchain-Based Architecture to Power a Distributed Network of Tamper-Evident Learning Trace Repositories. Search on Bibsonomy ICALT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
40Radhakrishna Bhat, N. R. Sunitha A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
40Ehsan Toreini New advances in tamper evident technologies. Search on Bibsonomy 2018   RDF
40Komal Batool, Muaz A. Niazi Tamper-Evident Complex Genomic Networks. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
40Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. Search on Bibsonomy IPCCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
40Ed Rao, Jim Remer Tamper evident tape integrity analyzer. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
40Mohammad M. Bany Taha, Sivadon Chaisiri, Ryan K. L. Ko Trusted Tamper-Evident Data Provenance. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
40Ryan K. L. Ko, Mark A. Will Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking. Search on Bibsonomy IEEE CLOUD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
40Stefan Wild, Falko Braune, Dominik Pretzsch, Michel Rienäcker, Martin Gaedke Tamper-Evident User Profiles for WebID-Based Social Networks. Search on Bibsonomy ICWE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
40Rody Kersten, Bernard van Gastel, Manu Drijvers, Sjaak Smetsers, Marko C. J. D. van Eekelen Using Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing. Search on Bibsonomy NASA Formal Methods The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
40Ioana Boureanu, Serge Vaudenay Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
40Ioana Boureanu, Serge Vaudenay Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
40Tal Moran, Moni Naor Basing cryptographic protocols on tamper-evident seals. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
40Kyung-Joong Kim 0001, Adrian Wong, Hod Lipson Automated synthesis of resilient and tamper-evident analog circuits without a single point of failure. Search on Bibsonomy Genet. Program. Evolvable Mach. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
40Bradley Baker, C. Edward Chow HTEE: An HMAC based Tamper Evident Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
40Adam Waksman, Simha Sethumadhavan Tamper Evident Microprocessors. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF microprocessors, hardware security, backdoors
40Scott A. Crosby, Dan S. Wallach Efficient Data Structures For Tamper-Evident Logging. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2009 DBLP  BibTeX  RDF
40Jing Zhang, Adriane Chapman, Kristen LeFevre Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40 A Tamper-Evident Voting Machine Resistant to Covert Channels. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
40Pieter H. Hartel, Leon Abelmann, Mohammed G. Khatib Towards Tamper-evident Storage on Patterned Media. Search on Bibsonomy FAST The full citation details ... 2008 DBLP  BibTeX  RDF
40Daniel Sandler, Kyle Derr, Dan S. Wallach VoteBox: A Tamper-evident, Verifiable Electronic Voting System. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2008 DBLP  BibTeX  RDF
40Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S. Wallach Finding the Evidence in Tamper-Evident Logs. Search on Bibsonomy SADFE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner 0001 Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
40Jong Youl Choi, Philippe Golle, Markus Jakobsson Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
40Gerome Miklau, Dan Suciu Implementing a Tamper-Evident Database System. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2000 DBLP  BibTeX  RDF
36Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas Offline untrusted storage with immediate detection of forking and replay attacks. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF forking attack, untrusted storage, virtual monotonic counters, TPM, replay attack, freshness, integrity checking
28Khaled Z. Ibrahim Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Bruce Christianson, Bruno Crispo, James A. Malcolm Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas Offline count-limited certificates. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF offline payments, authentication, smartcards, trusted platform module (TPM)
18Bruce Christianson Where Have All the Protocols Gone? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Axelle Apvrille, James P. Hughes 0001, Vincent Girier Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF XML, INTEGRITY, DIGITAL SIGNATURE, STORAGE, WORM, TIME STAMP
Displaying result #1 - #54 of 54 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license