The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase tamper-resistance (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1993-2001 (22) 2002-2003 (16) 2004-2005 (22) 2006-2007 (18) 2008-2011 (15) 2012-2023 (15)
Publication types (Num. hits)
article(18) incollection(4) inproceedings(84) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 178 occurrences of 109 keywords

Results
Found 108 publication records. Showing 108 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
112Hongxia Jin, Ginger Myles A technique for self-certifying tamper resistant software. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, content protection, attack tree, security measurement
90Paul C. van Oorschot, Anil Somayaji, Glenn Wurster Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design
87Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking
81Ross J. Anderson The Correctness of Crypto Transaction Sets (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
61Hongxia Jin, Ginger Myles, Jeffery Lotspiech Towards Better Software Tamper Resistance. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Brian Blietz, Akhilesh Tyagi Software Tamper Resistance Through Dynamic Program Monitoring. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye Tamper Resistance for Software Defined Radio Software. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Bill G. Horne, Lesley R. Matheson, Casey Sheehan, Robert Endre Tarjan Dynamic Self-Checking Techniques for Improved Tamper Resistance. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
58Eric Brier, Helena Handschuh, Christophe Tymen Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance
57Wil Michiels, Paul Gorissen Mechanism for software tamper resistance: an application of white-box cryptography. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, white-box cryptography, software protection
57Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan Proteus: virtualization for diversified tamper-resistance. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance
48Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
48Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi Cryptanalysis of a White Box AES Implementation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF white box, implementation, block ciphers, AES, tamper resistance, software piracy
48Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater Memories: A Survey of Their Secure Uses in Smart Cards. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure memories, Smart cards, Tamper resistance, Side channels, Secure hardware
48Jean-Jacques Quisquater, David Samyde ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA
42Lei Xie, Hongsong Zhu, Yongjun Xu, Yuefei Zhu A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks. Search on Bibsonomy GCC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ubiquitous/pervasive computing, clustering network architecture, wireless sensor network, key management, trusted computing
42Glenn Wurster, Paul C. van Oorschot, Anil Somayaji A Generic Attack on Checksumming-Based Software Tamper Resistance. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar Tamper Resistance Mechanisms for Secure, Embedded Systems. Search on Bibsonomy VLSI Design The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan Tamper-Tolerant Software: Modeling and Implementation. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF virtual machines, malware detection, rootkits
32André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Property-Based Broadcast Encryption for Multi-level Security Policies. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Tao Zhang 0037, Santosh Pande, Antonio Valverde Garcia Tamper-resistant whole program partitioning. Search on Bibsonomy LCTES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ramper resistance, smart card, mobile code, program partitioning
32Bill G. Horne, Benny Pinkas, Tomas Sander Escrow services and incentives in peer-to-peer networks. Search on Bibsonomy EC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Masaya Yoshikawa, Y. Kojima Efficient Random Number for the Masking Method against DPA Attacks. Search on Bibsonomy ICSEng The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Cryptography, Information security, Side channel attacks, Differential power analysis, Tamper resistance
32Sergei Skorobogatov Optical Fault Masking Attacks. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF optical fault attacks, semi-invasive methods, write protection, tamper resistance, hardware security
32Clifford Liem, Yuan Xiang Gu, Harold Johnson A compiler-based infrastructure for software-protection. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF compiler-based techniques, software protection, tamper resistance, code transformation
32Saar Drimer, Steven J. Murdoch, Ross J. Anderson Thinking Inside the Box: System-Level Failures of Tamper Proofing. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV
32Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao A control flow obfuscation method to discourage malicious tampering of software codes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation
32Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh Towards the issues in architectural support for protection of software execution. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, encryption, attack, tamper resistance, copy protection
32Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere Hybrid static-dynamic attacks against software protection mechanisms. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance
32Srivaths Ravi 0001, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady Security in embedded systems: Design challenges. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF processing requirements, security, Embedded systems, authentication, architecture, encryption, security protocols, hardware design, tamper resistance, decryption, cryptographic algorithms, security attacks, battery life
32Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 Attacks and risk analysis for hardware supported software copy protection systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attack, tamper resistance, copy protection
32Srivaths Ravi 0001, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan Security as a new dimension in embedded system design. Search on Bibsonomy DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software attacks, security, performance, design, embedded systems, architectures, cryptography, sensors, PDAs, design methodologies, security protocols, digital rights management, trusted computing, tamper resistance, viruses, battery life, security processing
32Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas Silicon physical random functions. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF physical random function, unclonability, identification, smartcard, tamper resistance, physical security
32Tao Zhang 0037, Santosh Pande, André L. M. dos Santos, Franz Josef Bruecklmayr Leakage-proof program partitioning. Search on Bibsonomy CASES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multi-application smart card, mobile code, tamper-resistance, program partitioning
32David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater On a New Way to Read Data from Memory. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF data remanence, electromagnetic security, semi-invasive attacks, optical probing, eddy current attack, Smartcards, tamper resistance
32Sung-Ming Yen, Marc Joye Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fault-based cryptanalysis, interleaved modular multiplication, Cryptography, exponentiation, tamper resistance
26Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Hoi Chang, Mikhail J. Atallah Protecting Software Code by Guards. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Tsutomu Matsumoto Incidence Structures for Key Sharing (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix
26Stefan Brands Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Davor Vinko, Kruno Milicevic, Ivica Lukic, Mirko Köhler 0002 Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang 0002, Guowen Xu, Xinyi Huang 0001, Robert H. Deng A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Yusuke Nozaki, Shu Takemoto, Masaya Yoshikawa Tamper Resistance Evaluation of Midori128 against Differential Power Analysis. Search on Bibsonomy ICKII The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Wenying Zheng, Chin-Feng Lai, Bing Chen 0002 Blockchain-based access control with k $k$ -times tamper resistance in cloud environment. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Qi-Xian Huang, Ming-Chang Lu, Min-Yi Chiu, Yuan-Chia Tsai, Hung-Min Sun PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Yusuke Nozaki, Masaya Yoshikawa Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller. Search on Bibsonomy ICSIM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl Secure Physical Enclosures from Covers with Tamper-Resistance. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Tingting Lin, Yixin Zhong, Xuejia Lai, Weidong Qiu Software Tamper Resistance Based on White-Box SMS4 Implementation. Search on Bibsonomy iSCI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Hugues Mercier, Maxime Augier, Arjen K. Lenstra STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Changhee Hahn, Hyunsoo Kwon, Junbeom Hur Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. Search on Bibsonomy IEEE CLOUD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Yusuke Nozaki, Masaya Yoshikawa Tamper resistance evaluation of PUF implementation against machine learning attack. Search on Bibsonomy ICBEA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Yoshiya Ikezaki, Yusuke Nozaki, Hideki Nagata, Masaya Yoshikawa FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF. Search on Bibsonomy GCCE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware. Search on Bibsonomy OTM Conferences The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Jia-Chun Lin, Shiuhpyng Shieh, Chia-Wei Hsu Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2014 DBLP  BibTeX  RDF
26Alexandra Nielsen, Wayne W. Wakeland Dynamic Simulation of the Effect of Tamper Resistance on Opioid Misuse Outcomes. Search on Bibsonomy SIMULTECH (Selected Papers) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Markus Kuhn 0001 Smartcard Tamper Resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Tom Caddy Tamper Resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Yanli Guo Confidentiality and Tamper---Resistance of Embedded Databases. (Confidentialité et Intégrité de Bases de Données embarquées). Search on Bibsonomy 2011   RDF
26Hang Bae Chang, Hyuk Jun Kwon, Jong Gu Kang The design and implementation of tamper resistance for mobile game service. Search on Bibsonomy Mob. Inf. Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Sudeep Ghosh, Jason Hiser, Jack W. Davidson A Secure and Robust Approach to Software Tamper Resistance. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen 0002, Wenbo Wang 0001, Lu He A Dynamic Graph Watermark Scheme of Tamper Resistance. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Paulo Mateus, Serge Vaudenay On Tamper-Resistance from a Theoretical Viewpoint. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Hangbae Chang, Hyuk-Jun Kwon, Ilsun You The Study on Software Tamper Resistance for Securing a Game Service. Search on Bibsonomy CISIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Volker Krummel Tamper resistance of AES: models, attacks and countermeasures. (PDF / PS) Search on Bibsonomy 2007   RDF
26Markus Kuhn 0001 Smartcard tamper resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Tom Caddy Tamper Resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Mahalingam Ramkumar, Nasir D. Memon Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
26Hongxia Jin, Gregory F. Sullivan, Gerald M. Masson Software Tamper Resistance Using Program Certificates. Search on Bibsonomy SAFECOMP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Kimio Kuramitsu, Ken Sakamura Tamper-Resistance Network - An Infrastructure for moving electronic tokens. Search on Bibsonomy I3E The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung Funkspiel schemes: an alternative to conventional tamper resistance. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Marc Girault Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures. Search on Bibsonomy CARDIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26David Paul Maher Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective. Search on Bibsonomy Financial Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Hung-Min Sun, King-Hang Wang, Chien-Ming Chen 0001 On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Frédéric Amiel, Karine Villegas, Benoit Feix, Louis Marcel Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mahadevan Gomathisankaran, Akhilesh Tyagi Architecture Support for 3D Obfuscation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure systems architecture, digital rights management, Obfuscation
16Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
16Chin-Chen Chang 0001, Chia-Chi Wu A Novel Key Agreement Scheme in a Multiple Server Environment. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, password, Key agreement, multi-server, remote authentication
16Sankardas Roy, Sanjeev Setia, Sushil Jajodia Attack-resilient hierarchical data aggregation in sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack-resilient, synopsis diffusion, data aggregation, sensor network security, hierarchical aggregation
16SeongHan Shin, Kazukuni Kobara, Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Balaji Venkatachalam Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Mahadevan Gomathisankaran, Akhilesh Tyagi Arc3D: A 3D Obfuscation Architecture. Search on Bibsonomy HiPEAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Vural Ünlü, Thomas Hess The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Joseph Zambreno, Rahul Simha, Alok N. Choudhary Addressing application integrity attacks using a reconfigurable architecture. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Colin D. Walter Issues of Security with the Oswald-Aigner Exponentiation Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA
16Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum Support for multi-level security policies in DRM architectures. Search on Bibsonomy NSPW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Philip D. MacKenzie, Michael K. Reiter Networked cryptographic devices resilient to capture. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices
16Dalit Naor, Moni Naor Protecting Cryptographic Keys: The Trace-and-Revoke Approach. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16David Lie, Chandramohan A. Thekkath, Mark Horowitz Implementing an untrusted operating system on trusted hardware. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF XOM, XOMOS, untrusted operating systems
16Paul C. van Oorschot Revisiting Software Protection. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Taekyoung Kwon 0002 Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Colin D. Walter Seeing through MIST Given a Small Fraction of an RSA Private Key. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA
16Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor Security Evaluation of Asynchronous Circuits. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Dual-Rail encoding, EMA, Design-time security evaluation, Asynchronous circuits, Power Analysis, Fault Analysis
16Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai An Anonymous Loan System Based on Group Signature Scheme. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation
16Taekyoung Kwon 0002 On the Difficulty of Protecting Private Keys in Software. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto Editorial. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 108 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license