Common cryptographic architecture cryptographic application programming interface
IBM Systems Journal - Special issue on cryptology
Key handling with control vectors
IBM Systems Journal - Special issue on cryptology
Transaction security system extensions to the common cryptographic architecture
IBM Systems Journal - Special issue on cryptology
A key-management scheme based on control vectors
IBM Systems Journal - Special issue on cryptology
Transaction security system extensions to the common cryptographic architecture
IBM Systems Journal - Special issue on cryptology
On the design and administration of secure database transactions
ACM SIGSAC Review - Special issue on Issues '91: data management security and privacy standards
On m-Permutation Protection Scheme Against Modification Attack
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Serpent: A New Block Cipher Proposal
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Memories: A Survey of Their Secure Uses in Smart Cards
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
A public key extension to the common Cryptographic Architecture
IBM Systems Journal
The IBM PCIXCC: a new cryptographic coprocessor for the IBM eServer
IBM Journal of Research and Development
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Tamper resistant software: extending trust into a hostile environment
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Improving DES coprocessor throughput for short operations
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Improving DES coprocessor throughput for short operations
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Active hardware metering for intellectual property protection and security
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Journal of Systems and Software
Operating system controlled processor-memory bus encryption
Proceedings of the conference on Design, automation and test in Europe
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
SARFUM: Security Architecture for Remote FPGA Update and Monitoring
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Threat agents: a necessary component of threat analysis
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Securing embedded programmable gate arrays in secure circuits
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
First principal components analysis: a new side channel distinguisher
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Proceedings of the 18th ACM conference on Computer and communications security
Dependability evaluation of integrated circuits at design time against laser fault injection
Security and Communication Networks
Configuration-based approach to embedded device security
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
A low-entropy first-degree secure provable masking scheme for resource-constrained devices
Proceedings of the Workshop on Embedded Systems Security
Hi-index | 0.00 |