Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,356,353 papers from all fields of science
Search
Sign In
Create Free Account
Tamper resistance
Known as:
Tamper-resistant
, Tamper-resistance
, Tamper proof
Expand
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Anti-tamper software
Authorization certificate
Broadcast encryption
Bus (computing)
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
BiTR: Built-in Tamper Resilience
Seung Geol Choi
,
A. Kiayias
,
T. Malkin
IACR Cryptology ePrint Archive
2011
Corpus ID: 7617000
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic…
Expand
Highly Cited
2005
Highly Cited
2005
Combining cryptography with biometrics effectively
F. Hao
,
Ross J. Anderson
,
J. Daugman
2005
Corpus ID: 12935968
We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable…
Expand
Highly Cited
2004
Highly Cited
2004
Electricity theft: a comparative analysis
T. B. Smith
2004
Corpus ID: 3866488
Highly Cited
2004
Highly Cited
2004
A new authentication scheme with anonymity for wireless environments
Jianming Zhu
,
Jianfeng Ma
IEEE Trans. Consumer Electron.
2004
Corpus ID: 16759964
Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is…
Expand
Highly Cited
2004
Highly Cited
2004
Key infection: smart trust for smart dust
Ross J. Anderson
,
Haowen Chan
,
A. Perrig
Proceedings of the 12th IEEE International…
2004
Corpus ID: 182657
Future distributed systems may include large self-organizing networks of locally communicating sensor nodes, any small number of…
Expand
Highly Cited
2004
Highly Cited
2004
Location-aware key management scheme for wireless sensor networks
Dijiang Huang
,
M. Mehta
,
D. Medhi
,
L. Harn
ACM Workshop on Security of ad hoc and Sensor…
2004
Corpus ID: 16786426
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys…
Expand
Highly Cited
2003
Highly Cited
2003
Kosmotropes Form the Basis of Protein-Resistant Surfaces
R. Kane
,
and Pascal Deschatelets
,
G. Whitesides
2003
Corpus ID: 84354211
This paper presents a hypothesis relating the exclusion of a molecule (solute) from the surface of a protein in aqueous solution…
Expand
Highly Cited
2003
Highly Cited
2003
Information hiding using steganography
M. Amin
,
S. Ibrahim
,
M. Salleh
,
Mohd Rozi
4th National Conference of Telecommunication…
2003
Corpus ID: 50035281
Due to advances in ICT, most information is kept electronically. Consequently, the security of information has become a…
Expand
Highly Cited
2002
Highly Cited
2002
The LSD Broadcast Encryption Scheme
D. Halevy
,
A. Shamir
Annual International Cryptology Conference
2002
Corpus ID: 15989687
Broadcast Encryption schemes enable a center to broadcast encrypted programs so that only designated subsets of users can decrypt…
Expand
Highly Cited
1998
Highly Cited
1998
Some general methods for tampering with watermarks
I. Cox
,
J. Linnartz
IEEE J. Sel. Areas Commun.
1998
Corpus ID: 3330472
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE