Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,276,255 papers from all fields of science
Search
Sign In
Create Free Account
Tamper resistance
Known as:
Tamper-resistant
, Tamper-resistance
, Tamper proof
Expand
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Anti-tamper software
Authorization certificate
Broadcast encryption
Bus (computing)
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Decentralizing Privacy: Using Blockchain to Protect Personal Data
Guy Zyskind
,
Oz Nathan
,
A. Pentland
IEEE Security and Privacy Workshops
2015
Corpus ID: 10184767
The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question…
Expand
Review
2011
Review
2011
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
G. Karagiannis
,
O. Altintas
,
+4 authors
Timothy R. Weil
IEEE Communications Surveys and Tutorials
2011
Corpus ID: 15343373
Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency…
Expand
Review
2004
Review
2004
Tamper resistance mechanisms for secure embedded systems
S. Ravi
,
A. Raghunathan
,
S. Chakradhar
17th International Conference on VLSI Design…
2004
Corpus ID: 18868189
Security is a concern in the design of a wide range of embedded systems. Extensive research has been devoted to the development…
Expand
Highly Cited
2003
Highly Cited
2003
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
L. Buttyán
,
J. Hubaux
Mob. Networks Appl.
2003
Corpus ID: 8113960
In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are…
Expand
Highly Cited
2003
Highly Cited
2003
Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks
S. Zhong
,
Jiang Chen
,
Y. Yang
IEEE INFOCOM . Twenty-second Annual Joint…
2003
Corpus ID: 3103973
Mobile ad hoc networking has been an active research area for several years. How to stimulate cooperation among selfish mobile…
Expand
Highly Cited
1997
Highly Cited
1997
Low Cost Attacks on Tamper Resistant Devices
Ross J. Anderson
,
M. Kuhn
Security Protocols Workshop
1997
Corpus ID: 1814359
There has been considerable recent interest in the level of tamper resistance that can be provided by low cost devices such as…
Expand
Highly Cited
1997
Highly Cited
1997
Differential Fault Analysis of Secret Key Cryptosystems
E. Biham
,
A. Shamir
Annual International Cryptology Conference
1997
Corpus ID: 12376527
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits…
Expand
Highly Cited
1996
Highly Cited
1996
Tamper resistance: a cautionary note
Ross J. Anderson
,
M. Kuhn
1996
Corpus ID: 2720649
An increasing number of systems from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security…
Expand
Highly Cited
1992
Highly Cited
1992
Wallet Databases with Observers
D. Chaum
,
Torben P. Pedersen
Annual International Cryptology Conference
1992
Corpus ID: 10914206
Previously there have been essentially only two models for computers that people can use to handle ordinary consumer transactions…
Expand
Highly Cited
1974
Highly Cited
1974
Design Of Ion-implanted MOSFET's with Very Small Physical Dimensions
Robert H. Dennard
,
F. Gaensslen
,
YU HWA-NIEN
,
V. L. Rideout
,
Ernest Bassous
,
A. Leblanc
Proceedings of the IEEE
1974
Corpus ID: 283984
This paper considers the design, fabrication, and characterization of very small Mosfet switching devices suitable for digital…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE