|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 178 occurrences of 109 keywords
|
|
|
Results
Found 108 publication records. Showing 108 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Hongxia Jin, Ginger Myles |
A technique for self-certifying tamper resistant software.  |
QoP  |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, content protection, attack tree, security measurement |
90 | Paul C. van Oorschot, Anil Somayaji, Glenn Wurster |
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance.  |
IEEE Trans. Dependable Secur. Comput.  |
2005 |
DBLP DOI BibTeX RDF |
self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design |
87 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.  |
MM&Sec  |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
81 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets (Discussion).  |
Security Protocols Workshop  |
2000 |
DBLP DOI BibTeX RDF |
|
61 | Hongxia Jin, Ginger Myles, Jeffery Lotspiech |
Towards Better Software Tamper Resistance.  |
ISC  |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Brian Blietz, Akhilesh Tyagi |
Software Tamper Resistance Through Dynamic Program Monitoring.  |
DRMTICS  |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye |
Tamper Resistance for Software Defined Radio Software.  |
COMPSAC (1)  |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Bill G. Horne, Lesley R. Matheson, Casey Sheehan, Robert Endre Tarjan |
Dynamic Self-Checking Techniques for Improved Tamper Resistance.  |
Digital Rights Management Workshop  |
2001 |
DBLP DOI BibTeX RDF |
|
58 | Eric Brier, Helena Handschuh, Christophe Tymen |
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware.  |
CHES  |
2001 |
DBLP DOI BibTeX RDF |
Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance |
57 | Wil Michiels, Paul Gorissen |
Mechanism for software tamper resistance: an application of white-box cryptography.  |
Digital Rights Management Workshop  |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, white-box cryptography, software protection |
57 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Proteus: virtualization for diversified tamper-resistance.  |
Digital Rights Management Workshop  |
2006 |
DBLP DOI BibTeX RDF |
virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance |
48 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications.  |
Selected Areas in Cryptography  |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
48 | Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi |
Cryptanalysis of a White Box AES Implementation.  |
Selected Areas in Cryptography  |
2004 |
DBLP DOI BibTeX RDF |
white box, implementation, block ciphers, AES, tamper resistance, software piracy |
48 | Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater |
Memories: A Survey of Their Secure Uses in Smart Cards.  |
IEEE Security in Storage Workshop  |
2003 |
DBLP DOI BibTeX RDF |
Secure memories, Smart cards, Tamper resistance, Side channels, Secure hardware |
48 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards.  |
E-smart  |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
42 | Lei Xie, Hongsong Zhu, Yongjun Xu, Yuefei Zhu |
A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks.  |
GCC Workshops  |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous/pervasive computing, clustering network architecture, wireless sensor network, key management, trusted computing |
42 | Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
A Generic Attack on Checksumming-Based Software Tamper Resistance.  |
S&P  |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar |
Tamper Resistance Mechanisms for Secure, Embedded Systems.  |
VLSI Design  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan |
Tamper-Tolerant Software: Modeling and Implementation.  |
IWSEC  |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan |
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.  |
Information Hiding  |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.  |
CCS  |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
32 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Property-Based Broadcast Encryption for Multi-level Security Policies.  |
ICISC  |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Tao Zhang 0037, Santosh Pande, Antonio Valverde Garcia |
Tamper-resistant whole program partitioning.  |
LCTES  |
2003 |
DBLP DOI BibTeX RDF |
ramper resistance, smart card, mobile code, program partitioning |
32 | Bill G. Horne, Benny Pinkas, Tomas Sander |
Escrow services and incentives in peer-to-peer networks.  |
EC  |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Masaya Yoshikawa, Y. Kojima |
Efficient Random Number for the Masking Method against DPA Attacks.  |
ICSEng  |
2011 |
DBLP DOI BibTeX RDF |
Cryptography, Information security, Side channel attacks, Differential power analysis, Tamper resistance |
32 | Sergei Skorobogatov |
Optical Fault Masking Attacks.  |
FDTC  |
2010 |
DBLP DOI BibTeX RDF |
optical fault attacks, semi-invasive methods, write protection, tamper resistance, hardware security |
32 | Clifford Liem, Yuan Xiang Gu, Harold Johnson |
A compiler-based infrastructure for software-protection.  |
PLAS  |
2008 |
DBLP DOI BibTeX RDF |
compiler-based techniques, software protection, tamper resistance, code transformation |
32 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Thinking Inside the Box: System-Level Failures of Tamper Proofing.  |
SP  |
2008 |
DBLP DOI BibTeX RDF |
Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV |
32 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes.  |
AsiaCCS  |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |
32 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh |
Towards the issues in architectural support for protection of software execution.  |
SIGARCH Comput. Archit. News  |
2005 |
DBLP DOI BibTeX RDF |
security, encryption, attack, tamper resistance, copy protection |
32 | Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Hybrid static-dynamic attacks against software protection mechanisms.  |
Digital Rights Management Workshop  |
2005 |
DBLP DOI BibTeX RDF |
watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance |
32 | Srivaths Ravi 0001, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady |
Security in embedded systems: Design challenges.  |
ACM Trans. Embed. Comput. Syst.  |
2004 |
DBLP DOI BibTeX RDF |
processing requirements, security, Embedded systems, authentication, architecture, encryption, security protocols, hardware design, tamper resistance, decryption, cryptographic algorithms, security attacks, battery life |
32 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 |
Attacks and risk analysis for hardware supported software copy protection systems.  |
Digital Rights Management Workshop  |
2004 |
DBLP DOI BibTeX RDF |
attack, tamper resistance, copy protection |
32 | Srivaths Ravi 0001, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan |
Security as a new dimension in embedded system design.  |
DAC  |
2004 |
DBLP DOI BibTeX RDF |
software attacks, security, performance, design, embedded systems, architectures, cryptography, sensors, PDAs, design methodologies, security protocols, digital rights management, trusted computing, tamper resistance, viruses, battery life, security processing |
32 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Silicon physical random functions.  |
CCS  |
2002 |
DBLP DOI BibTeX RDF |
physical random function, unclonability, identification, smartcard, tamper resistance, physical security |
32 | Tao Zhang 0037, Santosh Pande, André L. M. dos Santos, Franz Josef Bruecklmayr |
Leakage-proof program partitioning.  |
CASES  |
2002 |
DBLP DOI BibTeX RDF |
multi-application smart card, mobile code, tamper-resistance, program partitioning |
32 | David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater |
On a New Way to Read Data from Memory.  |
IEEE Security in Storage Workshop  |
2002 |
DBLP DOI BibTeX RDF |
data remanence, electromagnetic security, semi-invasive attacks, optical probing, eddy current attack, Smartcards, tamper resistance |
32 | Sung-Ming Yen, Marc Joye |
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis.  |
IEEE Trans. Computers  |
2000 |
DBLP DOI BibTeX RDF |
fault-based cryptanalysis, interleaved modular multiplication, Cryptography, exponentiation, tamper resistance |
26 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots.  |
RAID  |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Hoi Chang, Mikhail J. Atallah |
Protecting Software Code by Guards.  |
Digital Rights Management Workshop  |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Tsutomu Matsumoto |
Incidence Structures for Key Sharing (Extended Abstract).  |
ASIACRYPT  |
1994 |
DBLP DOI BibTeX RDF |
Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix |
26 | Stefan Brands |
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract).  |
CRYPTO  |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Davor Vinko, Kruno Milicevic, Ivica Lukic, Mirko Köhler 0002 |
Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices.  |
Sensors  |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang 0002, Guowen Xu, Xinyi Huang 0001, Robert H. Deng |
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.  |
IEEE Trans. Dependable Secur. Comput.  |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Shu Takemoto, Masaya Yoshikawa |
Tamper Resistance Evaluation of Midori128 against Differential Power Analysis.  |
ICKII  |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Wenying Zheng, Chin-Feng Lai, Bing Chen 0002 |
Blockchain-based access control with k $k$ -times tamper resistance in cloud environment.  |
Int. J. Intell. Syst.  |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Qi-Xian Huang, Ming-Chang Lu, Min-Yi Chiu, Yuan-Chia Tsai, Hung-Min Sun |
PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion.  |
Sensors  |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Masaya Yoshikawa |
Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller.  |
ICSIM  |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl |
Secure Physical Enclosures from Covers with Tamper-Resistance.  |
IACR Trans. Cryptogr. Hardw. Embed. Syst.  |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Tingting Lin, Yixin Zhong, Xuejia Lai, Weidong Qiu |
Software Tamper Resistance Based on White-Box SMS4 Implementation.  |
iSCI  |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Hugues Mercier, Maxime Augier, Arjen K. Lenstra |
STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement.  |
IEEE Trans. Inf. Theory  |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Changhee Hahn, Hyunsoo Kwon, Junbeom Hur |
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage.  |
IEEE CLOUD  |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Masaya Yoshikawa |
Tamper resistance evaluation of PUF implementation against machine learning attack.  |
ICBEA  |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Yoshiya Ikezaki, Yusuke Nozaki, Hideki Nagata, Masaya Yoshikawa |
FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF.  |
GCCE  |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral |
TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware.  |
OTM Conferences  |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jia-Chun Lin, Shiuhpyng Shieh, Chia-Wei Hsu |
Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability.  |
J. Inf. Sci. Eng.  |
2014 |
DBLP BibTeX RDF |
|
26 | Alexandra Nielsen, Wayne W. Wakeland |
Dynamic Simulation of the Effect of Tamper Resistance on Opioid Misuse Outcomes.  |
SIMULTECH (Selected Papers)  |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Markus Kuhn 0001 |
Smartcard Tamper Resistance.  |
Encyclopedia of Cryptography and Security (2nd Ed.)  |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Tom Caddy |
Tamper Resistance.  |
Encyclopedia of Cryptography and Security (2nd Ed.)  |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Yanli Guo |
Confidentiality and Tamper---Resistance of Embedded Databases. (Confidentialité et Intégrité de Bases de Données embarquées).  |
|
2011 |
RDF |
|
26 | Hang Bae Chang, Hyuk Jun Kwon, Jong Gu Kang |
The design and implementation of tamper resistance for mobile game service.  |
Mob. Inf. Syst.  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Sudeep Ghosh, Jason Hiser, Jack W. Davidson |
A Secure and Robust Approach to Software Tamper Resistance.  |
Information Hiding  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen 0002, Wenbo Wang 0001, Lu He |
A Dynamic Graph Watermark Scheme of Tamper Resistance.  |
IAS  |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Paulo Mateus, Serge Vaudenay |
On Tamper-Resistance from a Theoretical Viewpoint.  |
CHES  |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Hangbae Chang, Hyuk-Jun Kwon, Ilsun You |
The Study on Software Tamper Resistance for Securing a Game Service.  |
CISIS  |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Volker Krummel |
Tamper resistance of AES: models, attacks and countermeasures. (PDF / PS)  |
|
2007 |
RDF |
|
26 | Markus Kuhn 0001 |
Smartcard tamper resistance.  |
Encyclopedia of Cryptography and Security  |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Tom Caddy |
Tamper Resistance.  |
Encyclopedia of Cryptography and Security  |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Mahalingam Ramkumar, Nasir D. Memon |
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance.  |
IACR Cryptol. ePrint Arch.  |
2004 |
DBLP BibTeX RDF |
|
26 | Hongxia Jin, Gregory F. Sullivan, Gerald M. Masson |
Software Tamper Resistance Using Program Certificates.  |
SAFECOMP  |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Kimio Kuramitsu, Ken Sakamura |
Tamper-Resistance Network - An Infrastructure for moving electronic tokens.  |
I3E  |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung |
Funkspiel schemes: an alternative to conventional tamper resistance.  |
CCS  |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Marc Girault |
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.  |
CARDIS  |
1998 |
DBLP DOI BibTeX RDF |
|
26 | David Paul Maher |
Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective.  |
Financial Cryptography  |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Hung-Min Sun, King-Hang Wang, Chien-Ming Chen 0001 |
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme.  |
IEEE Trans. Dependable Secur. Comput.  |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Frédéric Amiel, Karine Villegas, Benoit Feix, Louis Marcel |
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis.  |
FDTC  |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy |
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks.  |
ACSAC  |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Architecture Support for 3D Obfuscation.  |
IEEE Trans. Computers  |
2006 |
DBLP DOI BibTeX RDF |
secure systems architecture, digital rights management, Obfuscation |
16 | Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou |
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.  |
ATC  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.  |
WISA  |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
16 | Chin-Chen Chang 0001, Chia-Chi Wu |
A Novel Key Agreement Scheme in a Multiple Server Environment.  |
WISA  |
2006 |
DBLP DOI BibTeX RDF |
smart card, password, Key agreement, multi-server, remote authentication |
16 | Sankardas Roy, Sanjeev Setia, Sushil Jajodia |
Attack-resilient hierarchical data aggregation in sensor networks.  |
SASN  |
2006 |
DBLP DOI BibTeX RDF |
attack-resilient, synopsis diffusion, data aggregation, sensor network security, hierarchical aggregation |
16 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security.  |
CIS  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Balaji Venkatachalam |
Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking.  |
IWDW  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Arc3D: A 3D Obfuscation Architecture.  |
HiPEAC  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Vural Ünlü, Thomas Hess |
The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection.  |
CEC  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Joseph Zambreno, Rahul Simha, Alok N. Choudhary |
Addressing application integrity attacks using a reconfigurable architecture.  |
FPGA  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm.  |
CT-RSA  |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
16 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
Support for multi-level security policies in DRM architectures.  |
NSPW  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Philip D. MacKenzie, Michael K. Reiter |
Networked cryptographic devices resilient to capture.  |
Int. J. Inf. Sec.  |
2003 |
DBLP DOI BibTeX RDF |
Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices |
16 | Dalit Naor, Moni Naor |
Protecting Cryptographic Keys: The Trace-and-Revoke Approach.  |
Computer  |
2003 |
DBLP DOI BibTeX RDF |
|
16 | David Lie, Chandramohan A. Thekkath, Mark Horowitz |
Implementing an untrusted operating system on trusted hardware.  |
SOSP  |
2003 |
DBLP DOI BibTeX RDF |
XOM, XOMOS, untrusted operating systems |
16 | Paul C. van Oorschot |
Revisiting Software Protection.  |
ISC  |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Taekyoung Kwon 0002 |
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity.  |
ACISP  |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key.  |
CT-RSA  |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
16 | Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor |
Security Evaluation of Asynchronous Circuits.  |
CHES  |
2003 |
DBLP DOI BibTeX RDF |
Dual-Rail encoding, EMA, Design-time security evaluation, Asynchronous circuits, Power Analysis, Fault Analysis |
16 | Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai |
An Anonymous Loan System Based on Group Signature Scheme.  |
ISC  |
2002 |
DBLP DOI BibTeX RDF |
Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation |
16 | Taekyoung Kwon 0002 |
On the Difficulty of Protecting Private Keys in Software.  |
ISC  |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski |
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.  |
Information Hiding  |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto |
Editorial.  |
Int. J. Inf. Sec.  |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 108 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|