Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
97 | Byoungcheon Lee, Kwangjo Kim |
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
tamper-resistant randomizer, divertible zero-knowledge proof, Electronic voting, receipt-freeness |
96 | Peter Landrock |
New PKI Protocols Using Tamper Resistant Hardware. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
Practical PKI, Light weight digital signature, HSM |
93 | Gang Tan, Yuqun Chen, Mariusz H. Jakubowski |
Delayed and Controlled Failures in Tamper-Resistant Software. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Seok Min Yoon, Seung Wook Lee, Hongmoon Wang, Jong Tae Kim |
Encoding-Based Tamper-Resistant Algorithm for Mobile Device Security. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
Security, Mobile Device, Tamper-resistant |
80 | Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon |
Tamper Resistant Software by Integrity-Based Encryption. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Tamper Resistant Software, Security, Software Protection |
78 | Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya |
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
70 | Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo |
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Mixnet, Designated-verifier re-encryption proof, Tamper resistant randomizer, Electronic voting, Receipt-freeness, Re-encryption |
70 | Liqun Chen 0002, Wenbo Mao |
An Auditable Metering Scheme for Web Advertisement Applications. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
Auditable metering, Tamper-resistant software, Lightweight security, Web advertisement |
69 | G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
AEGIS: architecture for tamper-evident and tamper-resistant processing. |
ICS |
2003 |
DBLP DOI BibTeX RDF |
software licensing, secure processors, certified execution |
69 | Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe |
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
62 | Tsutomu Matsumoto |
Incidence Structures for Key Sharing (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix |
62 | Feng Bao 0001 |
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
multimedia content protection, tamper-resistant hardware, watermarking technology, public key cryptography |
61 | Andrew J. Clark |
Physical Protection of Cryptographic Devices. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
61 | Chris Wullems, Mark Looi, Andrew J. Clark |
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Akira Matsunaga, Tsutomu Matsumoto |
Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Eric Brier, Helena Handschuh, Christophe Tymen |
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance |
53 | Mariano Ceccato, Jasvir Nagra, Paolo Tonella |
Distributing Trust Verification to Increase Application Performance. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
remote trust, smartcard, tamper resistant |
53 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
52 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 |
Attacks and risk analysis for hardware supported software copy protection systems. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
attack, tamper resistance, copy protection |
52 | Eli Biham, Adi Shamir |
Differential Fault Analysis of Secret Key Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
44 | Donggang Liu, Qi Dong 0001 |
Combating side-channel attacks using key management. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
44 | Alexander Zangerl |
Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Youtao Zhang, Jun Yang 0002, Lan Gao |
Efficient Group KeyManagement with Tamper-resistant ISA Extensions. |
ASAP |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin |
License Protection with a Tamper-Resistant Token. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat |
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
44 | David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz |
Specifying and Verifying Hardware for Tamper-Resistant Software. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
44 | J. R. Nickerson, S. T. Chow, H. J. Johnson |
Tamper resistant software: extending trust into a hostile environment. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
|
44 | David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz |
Architectural Support for Copy and Tamper Resistant Software. |
ASPLOS |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Helena Handschuh, Pascal Paillier, Jacques Stern |
Probing Attacks on Tamper-Resistant Devices. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
|
42 | Moon Chan Park, Woo Kwon Koo, Dong Geun Suh, In-Seok Kim, Dong Hoon Lee 0001 |
Two-stage tamper response in tamper-resistant software. |
IET Softw. |
2016 |
DBLP DOI BibTeX RDF |
|
42 | G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. |
ICS 25th Anniversary |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Mitsuru Shiozaki, Takaya Kubota, Tsunato Nakai, Akihiro Takeuchi, Takashi Nishimura, Takeshi Fujino |
Tamper-resistant authentication system with side-channel attack resistant AES and PUF using MDR-ROM. |
ISCAS |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Yan Sui, Fabio Maino, Yudong Guo, Kai Wang, Xukai Zou |
An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy. |
MSN |
2009 |
DBLP DOI BibTeX RDF |
Time-bound hierarchical key management, Dynamicity, Tamper-resistant, Hierarchical Access Control |
34 | Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee |
Memory-Centric Security Architecture. |
Trans. High Perform. Embed. Archit. Compil. |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Wil Michiels, Paul Gorissen |
Mechanism for software tamper resistance: an application of white-box cryptography. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, white-box cryptography, software protection |
34 | Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee |
Memory-Centric Security Architecture. |
HiPEAC |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh |
Terra: a virtual machine-based platform for trusted computing. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
authentication, virtual machine, trusted computing, virtual machine monitor, attestation, VMM |
34 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
32 | Sung-Kyoung Kim, Dong-Guk Han, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 |
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Radu Sion |
Strong WORM. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jean-Pierre Seifert |
On authenticated computing and RSA-based authentication. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
authenticated computing, RSA, fault attacks, secure boot |
27 | Gildas Avoine, Etienne Dysli, Philippe Oechslin |
Reducing Time Complexity in RFID Systems. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Khaled Z. Ibrahim |
Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. |
Asia-Pacific Computer Systems Architecture Conference |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rüdiger Weis, Bastiaan Bakker, Stefan Lucks |
Security on Your Hand: Secure Filesystems with a "Non-Cryptographic" JAVA-Ring. |
Java Card Workshop |
2000 |
DBLP DOI BibTeX RDF |
i-Button, Remotely Keyed Encryption, tamper proof |
27 | Stefan Brands |
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
27 | Jianfei Sun, Junyi Tao, Hao Zhang, Yanan Zhao, Liming Nie, Xiaochun Cheng, Tianwei Zhang 0004 |
A Tamper-Resistant Broadcasting Scheme for Secure Communication in Internet of Autonomous Vehicles. |
IEEE Trans. Intell. Transp. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Salvatore D'Antonio, Roberto Nardone, Nicola Russo, Federica Uccello |
A Tamper-Resistant Storage Framework for Smart Grid security. |
PDP |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yui Koyanagi, Tomoaki Ukezono |
A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper-resistant AES Design. |
CANDARW |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Haosen Yu, Peiyao Sun, Basel Halak, Karthik Shanthakumar, Tomasz Kazmierski |
Tamper Resistant Design of Convolutional Neural Network Hardware Accelerator. |
AsianHOST |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Riaan Bezuidenhout, Wynand Nel, Jacques M. Maritz |
Embedding Tamper-Resistant, Publicly Verifiable Random Number Seeds in Permissionless Blockchain Systems. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
27 | M. Lavanya, V. Kavitha |
Secure Tamper-Resistant Electronic Health Record Transaction in Cloud System Via Blockchain. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Thomas H. Austin, Fabio Di Troia |
A Blockchain-Based Tamper-Resistant Logging Framework. |
SVCC |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Kathrin Garb, Johannes Obermaier, Elischa Ferres, Martin Künig |
FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor. |
PST |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Jun Shiomi, Shuya Kotsugi, Boyu Dong, Hidetoshi Onodera, Akihiko Shinya, Masaya Notomi |
Tamper-Resistant Optical Logic Circuits Based on Integrated Nanophotonics. |
DAC |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Jack Tang, Mohamed Ibrahim 0002, Krishnendu Chakrabarty, Ramesh Karri |
Synthesis of Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Fangyuan Xu, Ryo Ariizumi, Shun-Ichi Azuma, Toru Asai |
Tamper-resistant controller using neural network and time-varying quantization. |
Artif. Life Robotics |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Nan Zheng, Zack Ives |
Compact, Tamper-Resistant Archival of Fine-Grained Provenance. (PDF / PS) |
Proc. VLDB Endow. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Jinwoo Ahn, Junghee Lee, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim 0001 |
DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX. |
AsiaCCS |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Akram Hakiri, Bassem Sellami, Sadok Ben Yahia, Pascal Berthou |
A Blockchain Architecture for SDN-enabled Tamper-Resistant IoT Networks. |
GIIS |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Fuxiao Zhou, Haopeng Chen, Zhijian Jiang |
A Tamper-Resistant and Decentralized Service for Cloud Storage Based on Layered Blockchain. |
CollaborateCom (2) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Hannah Atmer, Kilian Rausch, Daniel McNally |
ODIN: Tamper-Resistant Round Trip Time Measurement for Distributed Systems. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
27 | Elischa Ferres, Vincent Immler, Alexander Utz, Alexander Stanitzki, Reneé Lerch, Rainer Kokozinski |
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures. |
IEEE SENSORS |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Roland Meier, Cornelia Scherrer, David Gugelmann, Vincent Lenders, Laurent Vanbever |
FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds. |
CyCon |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Vincent Immler, Johannes Obermaier, Martin König, Matthias Hiller, Georg Sigl |
B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Jack Tang, Mohamed Ibrahim 0002, Krishnendu Chakrabarty, Ramesh Karri |
Tamper-resistant pin-constrained digital microfluidic biochips. |
DAC |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
27 | Chenyu Wang, Guoai Xu |
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. |
Secur. Commun. Networks |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Takeshi Fujino, Takaya Kubota, Mitsuru Shiozaki |
Tamper-resistant cryptographic hardware. |
IEICE Electron. Express |
2017 |
DBLP DOI BibTeX RDF |
|
27 | M. Fahim Ferdous Khan, Ken Sakamura |
A tamper-resistant digital token-based rights management system. |
ICCST |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Rei Ueno, Naofumi Homma, Sumio Morioka, Takafumi Aoki |
Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme. |
DATE |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Chittaranjan Hota, Rajesh Kumar Shrivastava, Shivangi Shipra |
Tamper-resistant code using optimal ROP gadgets for IoT devices. |
IWCMC |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone |
A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database. |
EDCC |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. |
WISTP |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Rei Ueno, Naofumi Homma, Takafumi Aoki |
A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d + 1) Input Shares. |
ISMVL |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Sharareh Zamanzadeh, Ali Jahanian 0001 |
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose. |
ISC Int. J. Inf. Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Pelin Angin, Bharat K. Bhargava, Rohit Ranchal |
Tamper-resistant autonomous agents-based mobile-cloud computing. |
NOMS |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Khan Ferdous Wahid, Helmut Kaufmann, Kevin Jones |
Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures. |
CRITIS |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Adiseshu Hari, T. V. Lakshman |
The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet. |
HotNets |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Rui Liu 0005, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu |
A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
27 | M. Fahim Ferdous Khan, Ken Sakamura |
Tamper-Resistant Security for Cyber-Physical Systems with eTRON Architecture. |
DSDIS |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Z. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami |
Malware traffic detection using tamper resistant features. |
MILCOM |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Quoc-Cuong To |
Privacy-Preserving Query Execution using Tamper Resistant Hardware. Design and Performance Considerations. (Exécution de requêtes respectueuses de la vie privée grâce à l'utilisation de matériel sécurisé). |
|
2015 |
RDF |
|
27 | Norman Poh, Rita Wong, Gian Luca Marcialis |
Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study. |
CIBIM |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral |
Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware. |
EDBT |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Xiangyao Yu, Christopher W. Fletcher, Ling Ren 0001, Marten van Dijk, Srinivas Devadas |
Generalized external interaction with tamper-resistant hardware with bounded information leakage. |
CCSW |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Ang Mi, Weiping Wang 0003, Shigeng Zhang, Hong Song |
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. |
CSS |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Michael Hölzl, René Mayrhofer, Michael Roland 0001 |
Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. |
MoMM |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Martin Johns, Sebastian Lekies |
Tamper-Resistant LikeJacking Protection. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Young-Jin Kim 0001, Vladimir Kolesnikov, Marina Thottan |
TSAF: Tamper-resistant and scalable mutual authentication framework for plug-in EV charging. |
SmartGridComm |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Ping Echo Zhang |
Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. |
|
2013 |
RDF |
|
27 | Jiuyuan Huo, Hong Qu, Liqun Liu |
Design and Implementation of Automatic Defensive Websites Tamper-Resistant System. |
J. Softw. |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Masoumeh Safkhani, Nasour Bagheri, Majid Naderi |
On the Designing of a Tamper Resistant Prescription RFID Access Control System. |
J. Medical Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-ke Jan |
A Design of Tamper Resistant Prescription RFID Access Control System. |
J. Medical Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
27 | |
Secure password-based remote user authentication scheme with non-tamper resistant smart cards. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
27 | Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn |
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. |
AsiaCCS |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Anh-Tuan Hoang, Takeshi Fujino |
Intra-masking dual-rail memory on LUT implementation for tamper-resistant AES on FPGA. |
FPGA |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Ding Wang 0002, Chunguang Ma, Peng Wu |
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. |
DBSec |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Raja Naeem Akram |
A user centric security model for tamper-resistant devices. |
|
2012 |
RDF |
|