Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,149,025 papers from all fields of science
Search
Sign In
Create Free Account
Hardware restriction
Known as:
Hardware DRM
, Secure boot
, Hardware restrictions
Expand
A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components. The hardware restriction scheme may…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
ARM architecture
Android
Anti-tamper software
App Store
Expand
Broader (2)
Digital rights management
Proprietary hardware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens
Nico Döttling
,
Thilo Mie
,
J. Müller-Quade
,
Tobias Nilges
Theory of Cryptography Conference
2013
Corpus ID: 1442459
Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open…
Expand
2012
2012
Experimenting with ARM TrustZone -- Or: How I Met Friendly Piece of Trusted Hardware
Johannes Winter
IEEE 11th International Conference on Trust…
2012
Corpus ID: 2259839
ARM TrustZone is an emerging embedded security technology based on the split of a system into a secure and normal world…
Expand
2011
2011
Trust and Trusted Computing Platforms
D. Fisher
,
Jonathan M. McCune
,
Archie D. Andrews
2011
Corpus ID: 14157944
Abstract : Hardware-based trusted computing platforms are intended to overcome many of the problems of trust that are prominent…
Expand
2010
2010
The Two-dimensional Superscalar GAP Processor Architecture
S. Uhrig
,
Basher Shehan
,
Ralf Jahr
,
T. Ungerer
2010
Corpus ID: 54893557
In this paper we evaluate the new Grid Alu Processor architecture that is optimized for the execution of sequential instruction…
Expand
2009
2009
A Security Technology for Mobile Agent System Improved by Trusted Computing Platform
Zhidong Shen
,
Qiang Tong
Ninth International Conference on Hybrid…
2009
Corpus ID: 10528375
As a promising distributed computing technology, Mobile Agent (MA) can be used in many fields. But the security problem of MA is…
Expand
Highly Cited
2008
Highly Cited
2008
The eSTREAM Portfolio
S. Babbage
,
C. Cannière
,
+7 authors
M. Robshaw
2008
Corpus ID: 16749549
The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit…
Expand
2008
2008
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks
M. Juliato
,
C. Gebotys
NASA/ESA Conference on Adaptive Hardware and…
2008
Corpus ID: 18220866
The problem of recovering satellites from faults or attacks, and bringing them back to an operational and safe state is crucial…
Expand
2007
2007
Cell Broadband Engine processor vault security architecture
Kanna Shimizu
,
H. P. Hofstee
,
J. Liberty
IBM Journal of Research and Development
2007
Corpus ID: 8493581
Current data protection technologies such as those based on public-key encryption and broadcast encryption focus on the secure…
Expand
Highly Cited
2004
Highly Cited
2004
Better Privacy for Trusted Computing Platforms: (Extended Abstract)
J. Camenisch
European Symposium on Research in Computer…
2004
Corpus ID: 15701256
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a…
Expand
1998
1998
Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors
Sean W. Smith
,
V. Austel
USENIX Workshop on Electronic Commerce
1998
Corpus ID: 15746664
Secure coprocessors provide a foundation for many exciting electronic commerce applications, as previous work [20, 21] has…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE