Hardware restriction

Known as: Hardware DRM, Secure boot, Hardware restrictions 
A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components. The hardware restriction scheme may… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Smart contracts are programs that execute autonomously on blockchains. Their key envisioned uses (e.g. financial instruments… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 7
Is this relevant?
Highly Cited
2013
Highly Cited
2013
This paper describes the design of the Cipherbase system. Cipherbase is a full-fledged SQL database system that achieves high… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Secure set intersection protocols are the core building block for a manifold of privacy-preserving applications. In a recent work… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We explore the limits of single-server computational private information retrieval (PIR) for the purpose of preserving client… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2007
2007
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Recently, there has been considerable interest in providing "trusted computing platforms" using hardware~---~TCPA and Palladium… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
1996
1996
ed as part of the Starlight research program. program is investigating methods for military-relevant information security es… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?