Skip to search formSkip to main contentSkip to account menu

Tamper resistance

Known as: Tamper-resistant, Tamper-resistance, Tamper proof 
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic… 
Highly Cited
2005
Highly Cited
2005
We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable… 
Highly Cited
2004
Highly Cited
2004
Highly Cited
2004
Highly Cited
2004
Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is… 
Highly Cited
2004
Highly Cited
2004
Future distributed systems may include large self-organizing networks of locally communicating sensor nodes, any small number of… 
Highly Cited
2004
Highly Cited
2004
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys… 
Highly Cited
2003
Highly Cited
2003
This paper presents a hypothesis relating the exclusion of a molecule (solute) from the surface of a protein in aqueous solution… 
Highly Cited
2003
Highly Cited
2003
Due to advances in ICT, most information is kept electronically. Consequently, the security of information has become a… 
Highly Cited
2002
Highly Cited
2002
Broadcast Encryption schemes enable a center to broadcast encrypted programs so that only designated subsets of users can decrypt… 
Highly Cited
1998
Highly Cited
1998
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for…