Skip to search formSkip to main contentSkip to account menu

Hardware restriction

Known as: Hardware DRM, Secure boot, Hardware restrictions 
A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components. The hardware restriction scheme may… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open… 
2012
2012
  • Johannes Winter
  • 2012
  • Corpus ID: 2259839
ARM TrustZone is an emerging embedded security technology based on the split of a system into a secure and normal world… 
2011
2011
Abstract : Hardware-based trusted computing platforms are intended to overcome many of the problems of trust that are prominent… 
2010
2010
In this paper we evaluate the new Grid Alu Processor architecture that is optimized for the execution of sequential instruction… 
2009
2009
As a promising distributed computing technology, Mobile Agent (MA) can be used in many fields. But the security problem of MA is… 
Highly Cited
2008
Highly Cited
2008
The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit… 
2008
2008
The problem of recovering satellites from faults or attacks, and bringing them back to an operational and safe state is crucial… 
2007
2007
Current data protection technologies such as those based on public-key encryption and broadcast encryption focus on the secure… 
Highly Cited
2004
Highly Cited
2004
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a… 
1998
1998
Secure coprocessors provide a foundation for many exciting electronic commerce applications, as previous work [20, 21] has…