|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 31 occurrences of 27 keywords
|
|
|
Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
133 | Jong Youl Choi, Philippe Golle, Markus Jakobsson |
Auditable Privacy: On Tamper-Evident Mix Networks. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
tamper-evident, observer, malware, covert channel, Mix network, subliminal channel |
106 | Wei Han, Tao Hao, Dong Zheng 0001, Kefei Chen, Xiaofeng Chen 0001 |
A Tamper-Evident Voting Machine Resistant to Covert Channels. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
tamper-evident, receipt-free, electronic voting, covert channel |
83 | G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
AEGIS: architecture for tamper-evident and tamper-resistant processing. |
ICS |
2003 |
DBLP DOI BibTeX RDF |
software licensing, secure processors, certified execution |
73 | Gene Itkis |
Cryptographic tamper evidence. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
evolving cryptosystems, key evolution, tamper evidence, digital signatures, exposures |
67 | Jong Youl Choi, Philippe Golle, Markus Jakobsson |
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Dominique Cansell, J. Paul Gibson, Dominique Méry |
Formal verification of tamper-evident storage for e-voting. |
SEFM |
2007 |
DBLP DOI BibTeX RDF |
|
58 | David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner 0001 |
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Tal Moran, Moni Naor |
Basing Cryptographic Protocols on Tamper-Evident Seals. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
55 | G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas |
Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. |
ICS 25th Anniversary |
2014 |
DBLP DOI BibTeX RDF |
|
46 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
40 | Gorka Guardiola Muzquiz, Enrique Soriano-Salvador |
SealFSv2: combining storage-based and ratcheting for tamper-evident logging. |
Int. J. Inf. Sec. |
2023 |
DBLP DOI BibTeX RDF |
|
40 | David Koisser, Ahmad-Reza Sadeghi |
Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Aleksandar Manev |
Tamper-Evident Pairing. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Li Xu, Tianyu Li 0002, Zekeriya Erkin |
Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism. |
BCCA |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks |
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. |
AsiaCCS |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Enrique Soriano-Salvador, Gorka Guardiola Muzquiz |
SealFS: Storage-based tamper-evident logging. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
40 | Qian Lin 0002, Kaiyuan Yang 0003, Tien Tuan Anh Dinh, Qingchao Cai, Gang Chen 0001, Beng Chin Ooi, Pingcheng Ruan, Sheng Wang 0011, Zhongle Xie, Meihui Zhang 0001, Olafs Vandans |
ForkBase: Immutable, Tamper-evident Storage Substrate for Branchable Applications. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
40 | Qian Lin 0002, Kaiyuan Yang 0003, Tien Tuan Anh Dinh, Qingchao Cai, Gang Chen 0001, Beng Chin Ooi, Pingcheng Ruan, Sheng Wang 0011, Zhongle Xie, Meihui Zhang 0001, Olafs Vandans |
ForkBase: Immutable, Tamper-evident Storage Substrate for Branchable Applications. |
ICDE |
2020 |
DBLP DOI BibTeX RDF |
|
40 | Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates 0001, Christopher W. Fletcher, Andrew Miller, Dave Tian |
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. |
NDSS |
2020 |
DBLP BibTeX RDF |
|
40 | Vincent Immler, Karthik Uppund |
New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Claudia Pop, Marcel Antal, Tudor Cioara, Ionut Anghel, David Sera, Ioan Salomie, Giuseppe Raveduto, Denisa Ziu, Vincenzo Croce, Massimo Bertoncini |
Blockchain-Based Scalable and Tamper-Evident Solution for Registering Energy Data. |
Sensors |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Juan Carlos Farah, Andrii Vozniuk, María Jesús Rodríguez-Triana, Denis Gillet |
A Blueprint for a Blockchain-Based Architecture to Power a Distributed Network of Tamper-Evident Learning Trace Repositories. |
ICALT |
2018 |
DBLP DOI BibTeX RDF |
|
40 | Radhakrishna Bhat, N. R. Sunitha |
A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
40 | Ehsan Toreini |
New advances in tamper evident technologies. |
|
2018 |
RDF |
|
40 | Komal Batool, Muaz A. Niazi |
Tamper-Evident Complex Genomic Networks. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
40 | Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng |
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. |
IPCCC |
2017 |
DBLP DOI BibTeX RDF |
|
40 | Ed Rao, Jim Remer |
Tamper evident tape integrity analyzer. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Mohammad M. Bany Taha, Sivadon Chaisiri, Ryan K. L. Ko |
Trusted Tamper-Evident Data Provenance. |
TrustCom/BigDataSE/ISPA (1) |
2015 |
DBLP DOI BibTeX RDF |
|
40 | Ryan K. L. Ko, Mark A. Will |
Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking. |
IEEE CLOUD |
2014 |
DBLP DOI BibTeX RDF |
|
40 | Stefan Wild, Falko Braune, Dominik Pretzsch, Michel Rienäcker, Martin Gaedke |
Tamper-Evident User Profiles for WebID-Based Social Networks. |
ICWE |
2014 |
DBLP DOI BibTeX RDF |
|
40 | Rody Kersten, Bernard van Gastel, Manu Drijvers, Sjaak Smetsers, Marko C. J. D. van Eekelen |
Using Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing. |
NASA Formal Methods |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Ioana Boureanu, Serge Vaudenay |
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
40 | Ioana Boureanu, Serge Vaudenay |
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. |
ProvSec |
2012 |
DBLP DOI BibTeX RDF |
|
40 | Tal Moran, Moni Naor |
Basing cryptographic protocols on tamper-evident seals. |
Theor. Comput. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
40 | Kyung-Joong Kim 0001, Adrian Wong, Hod Lipson |
Automated synthesis of resilient and tamper-evident analog circuits without a single point of failure. |
Genet. Program. Evolvable Mach. |
2010 |
DBLP DOI BibTeX RDF |
|
40 | Bradley Baker, C. Edward Chow |
HTEE: An HMAC based Tamper Evident Encryption. |
SECRYPT |
2010 |
DBLP BibTeX RDF |
|
40 | Adam Waksman, Simha Sethumadhavan |
Tamper Evident Microprocessors. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
microprocessors, hardware security, backdoors |
40 | Scott A. Crosby, Dan S. Wallach |
Efficient Data Structures For Tamper-Evident Logging. |
USENIX Security Symposium |
2009 |
DBLP BibTeX RDF |
|
40 | Jing Zhang, Adriane Chapman, Kristen LeFevre |
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
|
40 | |
A Tamper-Evident Voting Machine Resistant to Covert Channels. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
40 | Pieter H. Hartel, Leon Abelmann, Mohammed G. Khatib |
Towards Tamper-evident Storage on Patterned Media. |
FAST |
2008 |
DBLP BibTeX RDF |
|
40 | Daniel Sandler, Kyle Derr, Dan S. Wallach |
VoteBox: A Tamper-evident, Verifiable Electronic Voting System. |
USENIX Security Symposium |
2008 |
DBLP BibTeX RDF |
|
40 | Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S. Wallach |
Finding the Evidence in Tamper-Evident Logs. |
SADFE |
2008 |
DBLP DOI BibTeX RDF |
|
40 | David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner 0001 |
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
40 | Jong Youl Choi, Philippe Golle, Markus Jakobsson |
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
40 | Gerome Miklau, Dan Suciu |
Implementing a Tamper-Evident Database System. |
ASIAN |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor |
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System. |
USENIX Security Symposium |
2000 |
DBLP BibTeX RDF |
|
36 | Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas |
Offline untrusted storage with immediate detection of forking and replay attacks. |
STC |
2007 |
DBLP DOI BibTeX RDF |
forking attack, untrusted storage, virtual monotonic counters, TPM, replay attack, freshness, integrity checking |
28 | Khaled Z. Ibrahim |
Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. |
Asia-Pacific Computer Systems Architecture Conference |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Bruce Christianson, Bruno Crispo, James A. Malcolm |
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls |
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas |
Offline count-limited certificates. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
offline payments, authentication, smartcards, trusted platform module (TPM) |
18 | Bruce Christianson |
Where Have All the Protocols Gone? |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Axelle Apvrille, James P. Hughes 0001, Vincent Girier |
Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
XML, INTEGRITY, DIGITAL SIGNATURE, STORAGE, WORM, TIME STAMP |
Displaying result #1 - #54 of 54 (100 per page; Change: )
|
|