Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,587,987 papers from all fields of science
Search
Sign In
Create Free Account
Tamper resistance
Known as:
Tamper-resistant
, Tamper-resistance
, Tamper proof
Expand
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Anti-tamper software
Authorization certificate
Broadcast encryption
Bus (computing)
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
RNA Silencing and Plant Viral Diseases
Zahra Koochakpour
,
B. Fakheri
2014
Corpus ID: 11857401
To reduce the losses caused by plant pathogens, plant biologists have adopted numerous methods to engineer resistant plants…
Expand
Highly Cited
2011
Highly Cited
2011
Association mapping for Fusarium head blight resistance in European soft winter wheat
T. Miedaner
,
T. Würschum
,
H. Maurer
,
V. Korzun
,
E. Ebmeyer
,
J. Reif
Molecular breeding
2011
Corpus ID: 22537179
Resistance to Fusarium head blight (FHB) is of great importance in wheat breeding programs in the northern hemisphere. In Europe…
Expand
Highly Cited
2010
Highly Cited
2010
Resistance Controllability of $\hbox{Ta}_{2} \hbox{O}_{5}/\hbox{TiO}_{2}$ Stack ReRAM for Low-Voltage and Multilevel Operation
M. Terai
,
Y. Sakotsubo
,
S. Kotsuji
,
Hiromitsu Hada
IEEE Electron Device Letters
2010
Corpus ID: 41063109
The controllability of resistance in the set (low resistance) and reset (high resistance) states of Ta2O5/TiO2 resistive random…
Expand
Highly Cited
2008
Highly Cited
2008
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks
H. Alzaid
,
Ernest Foo
,
J. G. Nieto
Ninth International Conference on Parallel and…
2008
Corpus ID: 2023943
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used in the near future due to its cheap cost and…
Expand
Highly Cited
2007
Highly Cited
2007
Towards a tamper-resistant kernel rootkit detector
Anh-Quynh Nguyen
,
Yoshiyasu Takefuji
ACM Symposium on Applied Computing
2007
Corpus ID: 9729388
A variety of tools and architectures have been developed to detect security violations to Operating System kernels. However, they…
Expand
Highly Cited
2006
Highly Cited
2006
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Fabio Picconi
,
N. Ravi
,
M. Gruteser
,
L. Iftode
International Workshop on VehiculAr Inter…
2006
Corpus ID: 113073
Vehicular ad-hoc networks present great opportunity for information exchange and equal opportunity for abuse. Validating traffic…
Expand
Highly Cited
2005
Highly Cited
2005
T-Engine: Japan's ubiquitous computing architecture is ready for prime time
J. Krikke
IEEE pervasive computing
2005
Corpus ID: 11365911
Japan is quietly positioning itself for the next phase in digital technology: ubiquitous computing. A sign of things to come is T…
Expand
2005
2005
A two-factor mobile authentication scheme for secure financial transactions
R. D. Pietro
,
G. Me
,
M. A. Strangio
International Conference on Medical Biometrics
2005
Corpus ID: 206816730
Many authentication schemes are based on parties possessing cryptographic keys often held on smart cards or other tamper-proof…
Expand
Highly Cited
1996
Highly Cited
1996
Compact multiple-valued multiplexers using negative differential resistance devices
H. Chan
,
S. Mohan
,
P. Mazumder
,
G. Haddad
IEEE J. Solid State Circuits
1996
Corpus ID: 17607890
Quantum electronic devices with negative differential resistance (NDR) characteristics have been used to design compact…
Expand
Highly Cited
1993
Highly Cited
1993
On-line tuning of the rotor time constant for vector-controlled induction motor in position control applications
S. Vukosavic
,
M. Stojic
IEEE transactions on industrial electronics…
1993
Corpus ID: 39321112
The induction motor drive with an indirect field-oriented controller (IFO) exhibits excellent behavior in a low-speed region…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE