Secure Digital

Known as: UHS, MicroSDHC card, MicroSDXC 
Secure Digital (SD) is a non-volatile memory card format developed by the SD Card Association (SDA) for use in portable devices. The standard was… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1946-2017
010020019462016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Computers, mobile phones, embedded devices and other components of IT systems can often be easily manipulated. Therefore, in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Small embedded integrated circuits (ICs) such as smart cards are vulnerable to the so-called side-channel attacks (SCAs). The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
In this paper, we propose a biometric solution to solve some of the significant problems associated with use of digital camera… (More)
  • figure 1
  • figure 2
  • table 7
  • figure 8
  • figure 10
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We construct the first efficient forward-secure digital signature scheme where the total number of time periods for which the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a quantum digital signature scheme whose security is based on fundamental principles of quantum physics. It allows a… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper, the widely used ECC digital signature scheme - ECDSA is advanced, and a new forward-secure digital signature… (More)
  • figure 1
Is this relevant?
2000
2000
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe a digital signature scheme in which the public key is fixed but the secret signing key is updated at regular… (More)
  • figure 1
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Much research in theoretical cryptography has been centered around finding the weakest possible cryptographic assumptions… (More)
Is this relevant?