|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 178 occurrences of 109 keywords
|
|
|
Results
Found 108 publication records. Showing 108 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Hongxia Jin, Ginger Myles |
A technique for self-certifying tamper resistant software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 12-14, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, content protection, attack tree, security measurement |
90 | Paul C. van Oorschot, Anil Somayaji, Glenn Wurster |
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(2), pp. 82-92, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design |
87 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 129-140, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
81 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 128-141, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
61 | Hongxia Jin, Ginger Myles, Jeffery Lotspiech |
Towards Better Software Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 417-430, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Brian Blietz, Akhilesh Tyagi |
Software Tamper Resistance Through Dynamic Program Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 146-163, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye |
Tamper Resistance for Software Defined Radio Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 383-391, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Bill G. Horne, Lesley R. Matheson, Casey Sheehan, Robert Endre Tarjan |
Dynamic Self-Checking Techniques for Improved Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 141-159, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
58 | Eric Brier, Helena Handschuh, Christophe Tymen |
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 16-27, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance |
57 | Wil Michiels, Paul Gorissen |
Mechanism for software tamper resistance: an application of white-box cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007, pp. 82-89, 2007, ACM, 978-1-59593-884-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, white-box cryptography, software protection |
57 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Proteus: virtualization for diversified tamper-resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006, pp. 47-58, 2006, ACM, 1-59593-555-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance |
48 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 128-143, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
48 | Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi |
Cryptanalysis of a White Box AES Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, pp. 227-240, 2004, Springer, 3-540-24327-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
white box, implementation, block ciphers, AES, tamper resistance, software piracy |
48 | Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater |
Memories: A Survey of Their Secure Uses in Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: 2nd International IEEE Security in Storage Workshop (SISW 2003), Information Assurance, The Storage Security Perspective, 31 October 2003, Washington, DC, USA, pp. 62-72, 2003, IEEE Computer Society, 0-7695-2059-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Secure memories, Smart cards, Tamper resistance, Side channels, Secure hardware |
48 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 200-210, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
42 | Lei Xie, Hongsong Zhu, Yongjun Xu, Yuefei Zhu |
A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing Workshops - GCC 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings, pp. 437-443, 2006, IEEE Computer Society, 0-7695-2695-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous/pervasive computing, clustering network architecture, wireless sensor network, key management, trusted computing |
42 | Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
A Generic Attack on Checksumming-Based Software Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 127-138, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar |
Tamper Resistance Mechanisms for Secure, Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 17th International Conference on VLSI Design (VLSI Design 2004), with the 3rd International Conference on Embedded Systems Design, 5-9 January 2004, Mumbai, India, pp. 605-, 2004, IEEE Computer Society, 0-7695-2072-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan |
Tamper-Tolerant Software: Modeling and Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 125-139, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan |
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 96-111, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 128-138, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
32 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Property-Based Broadcast Encryption for Multi-level Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 15-31, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Tao Zhang 0037, Santosh Pande, Antonio Valverde Garcia |
Tamper-resistant whole program partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCTES ![In: Proceedings of the 2003 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'03). San Diego, California, USA, June 11-13, 2003, pp. 209-219, 2003, ACM, 1-58113-647-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ramper resistance, smart card, mobile code, program partitioning |
32 | Bill G. Horne, Benny Pinkas, Tomas Sander |
Escrow services and incentives in peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), Tampa, Florida, USA, October 14-17, 2001, pp. 85-94, 2001, ACM, 1-58113-387-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Masaya Yoshikawa, Y. Kojima |
Efficient Random Number for the Masking Method against DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEng ![In: 21st International Conference on Systems Engineering (ICSEng 2011), Las Vegas, NV, USA, Aug. 16-18, 2011, pp. 321-324, 2011, IEEE, 978-1-4577-1078-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Cryptography, Information security, Side channel attacks, Differential power analysis, Tamper resistance |
32 | Sergei Skorobogatov |
Optical Fault Masking Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 23-29, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
optical fault attacks, semi-invasive methods, write protection, tamper resistance, hardware security |
32 | Clifford Liem, Yuan Xiang Gu, Harold Johnson |
A compiler-based infrastructure for software-protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008, pp. 33-44, 2008, ACM, 978-1-59593-936-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
compiler-based techniques, software protection, tamper resistance, code transformation |
32 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Thinking Inside the Box: System-Level Failures of Tamper Proofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 281-295, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV |
32 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 362, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |
32 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh |
Towards the issues in architectural support for protection of software execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 6-15, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, encryption, attack, tamper resistance, copy protection |
32 | Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Hybrid static-dynamic attacks against software protection mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pp. 75-82, 2005, ACM, 1-59593-230-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance |
32 | Srivaths Ravi 0001, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady |
Security in embedded systems: Design challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 3(3), pp. 461-491, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
processing requirements, security, Embedded systems, authentication, architecture, encryption, security protocols, hardware design, tamper resistance, decryption, cryptographic algorithms, security attacks, battery life |
32 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 |
Attacks and risk analysis for hardware supported software copy protection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 54-62, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
attack, tamper resistance, copy protection |
32 | Srivaths Ravi 0001, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan |
Security as a new dimension in embedded system design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 41th Design Automation Conference, DAC 2004, San Diego, CA, USA, June 7-11, 2004, pp. 753-760, 2004, ACM, 1-58113-828-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
software attacks, security, performance, design, embedded systems, architectures, cryptography, sensors, PDAs, design methodologies, security protocols, digital rights management, trusted computing, tamper resistance, viruses, battery life, security processing |
32 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Silicon physical random functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 148-160, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
physical random function, unclonability, identification, smartcard, tamper resistance, physical security |
32 | Tao Zhang 0037, Santosh Pande, André L. M. dos Santos, Franz Josef Bruecklmayr |
Leakage-proof program partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES 2002, Greenoble, France, October 8-11, 2002, pp. 136-145, 2002, ACM, 1-58113-575-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
multi-application smart card, mobile code, tamper-resistance, program partitioning |
32 | David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater |
On a New Way to Read Data from Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002, pp. 65-69, 2002, IEEE Computer Society, 0-7695-1888-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
data remanence, electromagnetic security, semi-invasive attacks, optical probing, eddy current attack, Smartcards, tamper resistance |
32 | Sung-Ming Yen, Marc Joye |
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 49(9), pp. 967-970, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
fault-based cryptanalysis, interleaved modular multiplication, Cryptography, exponentiation, tamper resistance |
26 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 198-218, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Hoi Chang, Mikhail J. Atallah |
Protecting Software Code by Guards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 160-175, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Tsutomu Matsumoto |
Incidence Structures for Key Sharing (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 342-353, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix |
26 | Stefan Brands |
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 302-318, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Davor Vinko, Kruno Milicevic, Ivica Lukic, Mirko Köhler 0002 |
Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(15), pp. 6769, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang 0002, Guowen Xu, Xinyi Huang 0001, Robert H. Deng |
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(1), pp. 53-67, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Shu Takemoto, Masaya Yoshikawa |
Tamper Resistance Evaluation of Midori128 against Differential Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICKII ![In: 6th IEEE International Conference on Knowledge Innovation and Invention, ICKII 2023, Sapporo, Japan, August 11-13, 2023, pp. 157-160, 2023, IEEE, 979-8-3503-2353-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Wenying Zheng, Chin-Feng Lai, Bing Chen 0002 |
Blockchain-based access control with k $k$ -times tamper resistance in cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 37(10), pp. 7787-7811, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Qi-Xian Huang, Ming-Chang Lu, Min-Yi Chiu, Yuan-Chia Tsai, Hung-Min Sun |
PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(5), pp. 1882, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Masaya Yoshikawa |
Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSIM ![In: ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, Sydney, NSW, Australia, January 12-15, 2020, pp. 226-231, 2020, ACM, 978-1-4503-7690-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl |
Secure Physical Enclosures from Covers with Tamper-Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), pp. 51-96, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Tingting Lin, Yixin Zhong, Xuejia Lai, Weidong Qiu |
Software Tamper Resistance Based on White-Box SMS4 Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iSCI ![In: Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings, pp. 486-495, 2019, Springer, 978-981-15-1300-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Hugues Mercier, Maxime Augier, Arjen K. Lenstra |
STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 64(6), pp. 4233-4258, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Changhee Hahn, Hyunsoo Kwon, Junbeom Hur |
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2-7, 2018, pp. 920-923, 2018, IEEE Computer Society, 978-1-5386-7235-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Masaya Yoshikawa |
Tamper resistance evaluation of PUF implementation against machine learning attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBEA ![In: Proceedings of the 2017 International Conference on Biometrics Engineering and Application, ICBEA 2017, Hong Kong, Hong Kong, April 21-23, 2017, pp. 1-6, 2017, ACM, 978-1-4503-4871-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Yoshiya Ikezaki, Yusuke Nozaki, Hideki Nagata, Masaya Yoshikawa |
FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: IEEE 6th Global Conference on Consumer Electronics, GCCE 2017, Nagoya, Japan, October 24-27, 2017, pp. 1-2, 2017, IEEE, 978-1-5090-4045-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral |
TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences ![In: On the Move to Meaningful Internet Systems: OTM 2015 Conferences - Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015, Proceedings, pp. 38-56, 2015, Springer, 978-3-319-26147-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jia-Chun Lin, Shiuhpyng Shieh, Chia-Wei Hsu |
Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 30(6), pp. 1847-1864, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
26 | Alexandra Nielsen, Wayne W. Wakeland |
Dynamic Simulation of the Effect of Tamper Resistance on Opioid Misuse Outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIMULTECH (Selected Papers) ![In: Simulation and Modeling Methodologies, Technologies and Applications - International Conference, SIMULTECH 2012 Rome, Italy, July 28-31, 2012 Revised Selected Papers, pp. 169-181, 2012, Springer, 978-3-319-03580-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Markus Kuhn 0001 |
Smartcard Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1225-1227, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Tom Caddy |
Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1278, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Yanli Guo |
Confidentiality and Tamper---Resistance of Embedded Databases. (Confidentialité et Intégrité de Bases de Données embarquées). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
26 | Hang Bae Chang, Hyuk Jun Kwon, Jong Gu Kang |
The design and implementation of tamper resistance for mobile game service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 6(1), pp. 85-105, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Sudeep Ghosh, Jason Hiser, Jack W. Davidson |
A Secure and Robust Approach to Software Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers, pp. 33-47, 2010, Springer, 978-3-642-16434-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen 0002, Wenbo Wang 0001, Lu He |
A Dynamic Graph Watermark Scheme of Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 3-6, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Paulo Mateus, Serge Vaudenay |
On Tamper-Resistance from a Theoretical Viewpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 411-428, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Hangbae Chang, Hyuk-Jun Kwon, Ilsun You |
The Study on Software Tamper Resistance for Securing a Game Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: 2009 International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009, Fukuoka, Japan, March 16-19, 2009, pp. 555-558, 2009, IEEE Computer Society, 978-0-7695-3575-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Volker Krummel |
Tamper resistance of AES: models, attacks and countermeasures. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2007 |
RDF |
|
26 | Markus Kuhn 0001 |
Smartcard tamper resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Tom Caddy |
Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Mahalingam Ramkumar, Nasir D. Memon |
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 89, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
26 | Hongxia Jin, Gregory F. Sullivan, Gerald M. Masson |
Software Tamper Resistance Using Program Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings, pp. 144-158, 2003, Springer, 3-540-20126-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Kimio Kuramitsu, Ken Sakamura |
Tamper-Resistance Network - An Infrastructure for moving electronic tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Towards The E-Society: E-Commerce, E-Business, and E-Government, The First IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2001), October 3-5, Zürich, Switzerland, pp. 113-128, 2001, Kluwer, 0-7923-7529-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung |
Funkspiel schemes: an alternative to conventional tamper resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 125-133, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Marc Girault |
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings, pp. 157-166, 1998, Springer, 3-540-67923-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | David Paul Maher |
Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings, pp. 109-122, 1997, Springer, 3-540-63594-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Hung-Min Sun, King-Hang Wang, Chien-Ming Chen 0001 |
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 159-160, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Frédéric Amiel, Karine Villegas, Benoit Feix, Louis Marcel |
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pp. 92-102, 2007, IEEE Computer Society, 0-7695-2982-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy |
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 257-267, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Architecture Support for 3D Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(5), pp. 497-507, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secure systems architecture, digital rights management, Obfuscation |
16 | Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou |
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 227-235, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 173-186, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
16 | Chin-Chen Chang 0001, Chia-Chi Wu |
A Novel Key Agreement Scheme in a Multiple Server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 187-197, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart card, password, Key agreement, multi-server, remote authentication |
16 | Sankardas Roy, Sanjeev Setia, Sushil Jajodia |
Attack-resilient hierarchical data aggregation in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 71-82, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
attack-resilient, synopsis diffusion, data aggregation, sensor network security, hierarchical aggregation |
16 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 767-777, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Balaji Venkatachalam |
Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 299-312, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Arc3D: A 3D Obfuscation Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPEAC ![In: High Performance Embedded Architectures and Compilers, First International Conference, HiPEAC 2005, Barcelona, Spain, November 17-18, 2005, Proceedings, pp. 184-199, 2005, Springer, 3-540-30317-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Vural Ünlü, Thomas Hess |
The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 512-517, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Joseph Zambreno, Rahul Simha, Alok N. Choudhary |
Addressing application integrity attacks using a reconfigurable architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, FPGA 2004, Monterey, California, USA, February 22-24, 2004, pp. 250, 2004, ACM, 1-58113-829-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 208-221, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
16 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
Support for multi-level security policies in DRM architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada, pp. 3-9, 2004, ACM, 1-59593-076-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Philip D. MacKenzie, Michael K. Reiter |
Networked cryptographic devices resilient to capture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(1), pp. 1-20, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices |
16 | Dalit Naor, Moni Naor |
Protecting Cryptographic Keys: The Trace-and-Revoke Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 36(7), pp. 47-53, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | David Lie, Chandramohan A. Thekkath, Mark Horowitz |
Implementing an untrusted operating system on trusted hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 178-192, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XOM, XOMOS, untrusted operating systems |
16 | Paul C. van Oorschot |
Revisiting Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 1-13, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Taekyoung Kwon 0002 |
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 476-487, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 391-402, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
16 | Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor |
Security Evaluation of Asynchronous Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 137-151, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Dual-Rail encoding, EMA, Design-time security evaluation, Asynchronous circuits, Power Analysis, Fault Analysis |
16 | Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai |
An Anonymous Loan System Based on Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 244-256, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation |
16 | Taekyoung Kwon 0002 |
On the Difficulty of Protecting Private Keys in Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 17-31, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski |
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 400-414, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto |
Editorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(1), pp. 1-2, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 108 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|