|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 178 occurrences of 109 keywords
|
|
|
Results
Found 108 publication records. Showing 108 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Hongxia Jin, Ginger Myles |
A technique for self-certifying tamper resistant software. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, content protection, attack tree, security measurement |
90 | Paul C. van Oorschot, Anil Somayaji, Glenn Wurster |
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design |
87 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
81 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets (Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
61 | Hongxia Jin, Ginger Myles, Jeffery Lotspiech |
Towards Better Software Tamper Resistance. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Brian Blietz, Akhilesh Tyagi |
Software Tamper Resistance Through Dynamic Program Monitoring. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye |
Tamper Resistance for Software Defined Radio Software. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Bill G. Horne, Lesley R. Matheson, Casey Sheehan, Robert Endre Tarjan |
Dynamic Self-Checking Techniques for Improved Tamper Resistance. |
Digital Rights Management Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
58 | Eric Brier, Helena Handschuh, Christophe Tymen |
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance |
57 | Wil Michiels, Paul Gorissen |
Mechanism for software tamper resistance: an application of white-box cryptography. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, white-box cryptography, software protection |
57 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Proteus: virtualization for diversified tamper-resistance. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance |
48 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
48 | Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi |
Cryptanalysis of a White Box AES Implementation. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
white box, implementation, block ciphers, AES, tamper resistance, software piracy |
48 | Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater |
Memories: A Survey of Their Secure Uses in Smart Cards. |
IEEE Security in Storage Workshop |
2003 |
DBLP DOI BibTeX RDF |
Secure memories, Smart cards, Tamper resistance, Side channels, Secure hardware |
48 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
42 | Lei Xie, Hongsong Zhu, Yongjun Xu, Yuefei Zhu |
A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks. |
GCC Workshops |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous/pervasive computing, clustering network architecture, wireless sensor network, key management, trusted computing |
42 | Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
A Generic Attack on Checksumming-Based Software Tamper Resistance. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar |
Tamper Resistance Mechanisms for Secure, Embedded Systems. |
VLSI Design |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan |
Tamper-Tolerant Software: Modeling and Implementation. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan |
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
32 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Property-Based Broadcast Encryption for Multi-level Security Policies. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Tao Zhang 0037, Santosh Pande, Antonio Valverde Garcia |
Tamper-resistant whole program partitioning. |
LCTES |
2003 |
DBLP DOI BibTeX RDF |
ramper resistance, smart card, mobile code, program partitioning |
32 | Bill G. Horne, Benny Pinkas, Tomas Sander |
Escrow services and incentives in peer-to-peer networks. |
EC |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Masaya Yoshikawa, Y. Kojima |
Efficient Random Number for the Masking Method against DPA Attacks. |
ICSEng |
2011 |
DBLP DOI BibTeX RDF |
Cryptography, Information security, Side channel attacks, Differential power analysis, Tamper resistance |
32 | Sergei Skorobogatov |
Optical Fault Masking Attacks. |
FDTC |
2010 |
DBLP DOI BibTeX RDF |
optical fault attacks, semi-invasive methods, write protection, tamper resistance, hardware security |
32 | Clifford Liem, Yuan Xiang Gu, Harold Johnson |
A compiler-based infrastructure for software-protection. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
compiler-based techniques, software protection, tamper resistance, code transformation |
32 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Thinking Inside the Box: System-Level Failures of Tamper Proofing. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV |
32 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |
32 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh |
Towards the issues in architectural support for protection of software execution. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
security, encryption, attack, tamper resistance, copy protection |
32 | Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Hybrid static-dynamic attacks against software protection mechanisms. |
Digital Rights Management Workshop |
2005 |
DBLP DOI BibTeX RDF |
watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance |
32 | Srivaths Ravi 0001, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady |
Security in embedded systems: Design challenges. |
ACM Trans. Embed. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
processing requirements, security, Embedded systems, authentication, architecture, encryption, security protocols, hardware design, tamper resistance, decryption, cryptographic algorithms, security attacks, battery life |
32 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 |
Attacks and risk analysis for hardware supported software copy protection systems. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
attack, tamper resistance, copy protection |
32 | Srivaths Ravi 0001, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan |
Security as a new dimension in embedded system design. |
DAC |
2004 |
DBLP DOI BibTeX RDF |
software attacks, security, performance, design, embedded systems, architectures, cryptography, sensors, PDAs, design methodologies, security protocols, digital rights management, trusted computing, tamper resistance, viruses, battery life, security processing |
32 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Silicon physical random functions. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
physical random function, unclonability, identification, smartcard, tamper resistance, physical security |
32 | Tao Zhang 0037, Santosh Pande, André L. M. dos Santos, Franz Josef Bruecklmayr |
Leakage-proof program partitioning. |
CASES |
2002 |
DBLP DOI BibTeX RDF |
multi-application smart card, mobile code, tamper-resistance, program partitioning |
32 | David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater |
On a New Way to Read Data from Memory. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
data remanence, electromagnetic security, semi-invasive attacks, optical probing, eddy current attack, Smartcards, tamper resistance |
32 | Sung-Ming Yen, Marc Joye |
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
fault-based cryptanalysis, interleaved modular multiplication, Cryptography, exponentiation, tamper resistance |
26 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Hoi Chang, Mikhail J. Atallah |
Protecting Software Code by Guards. |
Digital Rights Management Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Tsutomu Matsumoto |
Incidence Structures for Key Sharing (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix |
26 | Stefan Brands |
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Davor Vinko, Kruno Milicevic, Ivica Lukic, Mirko Köhler 0002 |
Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang 0002, Guowen Xu, Xinyi Huang 0001, Robert H. Deng |
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Shu Takemoto, Masaya Yoshikawa |
Tamper Resistance Evaluation of Midori128 against Differential Power Analysis. |
ICKII |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Wenying Zheng, Chin-Feng Lai, Bing Chen 0002 |
Blockchain-based access control with k $k$ -times tamper resistance in cloud environment. |
Int. J. Intell. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Qi-Xian Huang, Ming-Chang Lu, Min-Yi Chiu, Yuan-Chia Tsai, Hung-Min Sun |
PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Masaya Yoshikawa |
Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller. |
ICSIM |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl |
Secure Physical Enclosures from Covers with Tamper-Resistance. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Tingting Lin, Yixin Zhong, Xuejia Lai, Weidong Qiu |
Software Tamper Resistance Based on White-Box SMS4 Implementation. |
iSCI |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Hugues Mercier, Maxime Augier, Arjen K. Lenstra |
STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement. |
IEEE Trans. Inf. Theory |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Changhee Hahn, Hyunsoo Kwon, Junbeom Hur |
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. |
IEEE CLOUD |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yusuke Nozaki, Masaya Yoshikawa |
Tamper resistance evaluation of PUF implementation against machine learning attack. |
ICBEA |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Yoshiya Ikezaki, Yusuke Nozaki, Hideki Nagata, Masaya Yoshikawa |
FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF. |
GCCE |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral |
TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware. |
OTM Conferences |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jia-Chun Lin, Shiuhpyng Shieh, Chia-Wei Hsu |
Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability. |
J. Inf. Sci. Eng. |
2014 |
DBLP BibTeX RDF |
|
26 | Alexandra Nielsen, Wayne W. Wakeland |
Dynamic Simulation of the Effect of Tamper Resistance on Opioid Misuse Outcomes. |
SIMULTECH (Selected Papers) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Markus Kuhn 0001 |
Smartcard Tamper Resistance. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Tom Caddy |
Tamper Resistance. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Yanli Guo |
Confidentiality and Tamper---Resistance of Embedded Databases. (Confidentialité et Intégrité de Bases de Données embarquées). |
|
2011 |
RDF |
|
26 | Hang Bae Chang, Hyuk Jun Kwon, Jong Gu Kang |
The design and implementation of tamper resistance for mobile game service. |
Mob. Inf. Syst. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Sudeep Ghosh, Jason Hiser, Jack W. Davidson |
A Secure and Robust Approach to Software Tamper Resistance. |
Information Hiding |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen 0002, Wenbo Wang 0001, Lu He |
A Dynamic Graph Watermark Scheme of Tamper Resistance. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Paulo Mateus, Serge Vaudenay |
On Tamper-Resistance from a Theoretical Viewpoint. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Hangbae Chang, Hyuk-Jun Kwon, Ilsun You |
The Study on Software Tamper Resistance for Securing a Game Service. |
CISIS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Volker Krummel |
Tamper resistance of AES: models, attacks and countermeasures. (PDF / PS) |
|
2007 |
RDF |
|
26 | Markus Kuhn 0001 |
Smartcard tamper resistance. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Tom Caddy |
Tamper Resistance. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Mahalingam Ramkumar, Nasir D. Memon |
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
26 | Hongxia Jin, Gregory F. Sullivan, Gerald M. Masson |
Software Tamper Resistance Using Program Certificates. |
SAFECOMP |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Kimio Kuramitsu, Ken Sakamura |
Tamper-Resistance Network - An Infrastructure for moving electronic tokens. |
I3E |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung |
Funkspiel schemes: an alternative to conventional tamper resistance. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Marc Girault |
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures. |
CARDIS |
1998 |
DBLP DOI BibTeX RDF |
|
26 | David Paul Maher |
Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective. |
Financial Cryptography |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Hung-Min Sun, King-Hang Wang, Chien-Ming Chen 0001 |
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Frédéric Amiel, Karine Villegas, Benoit Feix, Louis Marcel |
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy |
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Architecture Support for 3D Obfuscation. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
secure systems architecture, digital rights management, Obfuscation |
16 | Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou |
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
16 | Chin-Chen Chang 0001, Chia-Chi Wu |
A Novel Key Agreement Scheme in a Multiple Server Environment. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
smart card, password, Key agreement, multi-server, remote authentication |
16 | Sankardas Roy, Sanjeev Setia, Sushil Jajodia |
Attack-resilient hierarchical data aggregation in sensor networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
attack-resilient, synopsis diffusion, data aggregation, sensor network security, hierarchical aggregation |
16 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Balaji Venkatachalam |
Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Arc3D: A 3D Obfuscation Architecture. |
HiPEAC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Vural Ünlü, Thomas Hess |
The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Joseph Zambreno, Rahul Simha, Alok N. Choudhary |
Addressing application integrity attacks using a reconfigurable architecture. |
FPGA |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
16 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
Support for multi-level security policies in DRM architectures. |
NSPW |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Philip D. MacKenzie, Michael K. Reiter |
Networked cryptographic devices resilient to capture. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices |
16 | Dalit Naor, Moni Naor |
Protecting Cryptographic Keys: The Trace-and-Revoke Approach. |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
16 | David Lie, Chandramohan A. Thekkath, Mark Horowitz |
Implementing an untrusted operating system on trusted hardware. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
XOM, XOMOS, untrusted operating systems |
16 | Paul C. van Oorschot |
Revisiting Software Protection. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Taekyoung Kwon 0002 |
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
16 | Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor |
Security Evaluation of Asynchronous Circuits. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Dual-Rail encoding, EMA, Design-time security evaluation, Asynchronous circuits, Power Analysis, Fault Analysis |
16 | Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai |
An Anonymous Loan System Based on Group Signature Scheme. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation |
16 | Taekyoung Kwon 0002 |
On the Difficulty of Protecting Private Keys in Software. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski |
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto |
Editorial. |
Int. J. Inf. Sec. |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 108 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|