|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9 occurrences of 9 keywords
|
|
|
Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
43 | Brian Blietz, Akhilesh Tyagi |
Software Tamper Resistance Through Dynamic Program Monitoring. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Sun S. Chung, Gultekin Özsoyoglu |
Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar |
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. |
SP |
2022 |
DBLP DOI BibTeX RDF |
|
40 | Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar |
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
31 | Jeffrey Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila |
Using logic-based reduction for adversarial component recovery. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
anti-tamper applications, circuit obfuscation, reverse engineering, intellectual property protection, hardware security |
31 | Alex Tsow |
An Improved Recovery Algorithm for Decayed AES Key Schedule Images. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
anti-tamper, decayed memory, cold-boot attack, AES, digital forensics, key schedule |
31 | Adrian Stoica, Srinivas Katkoori |
"Glitch Logic" and Applications to Computing and Information Security. |
BLISS |
2009 |
DBLP DOI BibTeX RDF |
anti-tamper, trusted design, protection to reverse engineering, information exfiltration, stego-design, hardware vulnerabilities |
31 | Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice |
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. |
VMSec |
2008 |
DBLP DOI BibTeX RDF |
anti-tamper, binding software to hardware, virtualization, software protection, physically unclonable functions |
24 | Adnan Iftekhar, Xiaohui Cui |
Anti-Tamper Protection for Internet of Things System Using Hyperledger Fabric Blockchain Technology. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
24 | Ara Hur, Yeonseung Ryu |
Developing Anti-tamper Functionalities through Continuous Integration. |
ICIIT |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Ara Hur, Jooeun Kim, Yeonseung Ryu |
Hiding Vulnerabilities of Internet of Things Software Using Anti-Tamper Technique. |
ICIIT |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Shuichi Kurabayashi |
Lambda Containers: A Comprehensive Anti-Tamper Framework for Games by Simulating Client Behavior in a Cloud. |
IEEE CLOUD |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Avinash R. Desai, Michael S. Hsiao, Chao Wang 0001, Leyla Nazhandali, T. Simin Hall |
Interlocking obfuscation for anti-tamper hardware. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Hing-Chung Tsang, Moon-Chuen Lee, Chi-Man Pun |
A Robust Anti-tamper Protection Scheme. |
ARES |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jeffrey Todd McDonald, Yong C. Kim, Daniel J. Koranek |
Deterministic circuit variation for anti-tamper applications. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryôichi Sasaki |
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery. |
J. Digit. Forensics Secur. Law |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Christopher J. Clark |
Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. |
HOST |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Roy Porter, Samuel J. Stone, Yong C. Kim, Jeffrey Todd McDonald, LaVern A. Starman |
Dynamic Polymorphic Reconfiguration for anti-tamper circuits. |
FPL |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Gultekin Özsoyoglu, David A. Singer, Sun S. Chung |
Anti-Tamper Databases: Querying Encrypted Databases. |
DBSec |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Jennifer English, David Coe, Rhonda Kay Gaede, David W. Hyde, Jeffrey H. Kulick |
MEMS-Assisted Cryptography for CPI Protection. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #20 of 20 (100 per page; Change: )
|
|