نتایج جستجو برای: tamper

تعداد نتایج: 2422  

2008

Laser-imploded targets, especially those imploded adiabatically, attain high temperatures in the compressed core. The imploded part of the surrounding tamper is considerably colder, especially if preheat is small. Under these conditions the continuous x-ray emission from the core undergoes absorption at wavelengths characteristic of atomic species in the tamper. The resulting absorption lines c...

2011
Nico Döttling Daniel Kraschewski Jörn Müller-Quade

Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...

2005
Elizabeth Haubert Joseph Tucek Larry Brumbaugh William Yurcik

Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...

Journal: :IACR Cryptology ePrint Archive 2009
Paulo Mateus Serge Vaudenay

Tamper-proof devices are pretty powerful. They typically make security applications simpler (provided that the tamper-proof assumption is not violated). For application requiring privacy, we observe that some properties may become harder (if possible at all) to achieve when devices are maliciously used. We take the example of deniability, receiptfreeness, and anonymity. We formalize the trusted...

2009
Cataldo Basile

A major challenge in software protection is the problem of tampering where an adversary modifies a program and uses it in a way that was not intended or desired. Several ad hoc techniques for software tamper resistance have been proposed, some of which provide a significant level of resilience against tampering. However, the literature lacks a formal definition of tampering that takes into acco...

2010
Feng-Hao Liu Anna Lysyanskaya

Gennaro et al. initiated the study of algorithmic tamper proof (ATP) cryptography: cryptographic hardware that remains secure even in the presence of an adversary who can tamper with the memory content of a hardware device. In this paper, we solve an open problem stated in their paper, and also consider whether a device can be secured against an adversary who can both tamper with its memory and...

Journal: :Baghdad Science Journal 2008

2015
Ibrahim Ethem Bagci Utz Roedig Ivan Martinovic Matthias Schulz Matthias Hollick

The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tampering with IoT devices is detected. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble which allows a r...

1998
Deepa Kundur Dimitrios Hatzinakos

In this paper we present a novel fragile watermarking scheme for the tamper-proo ng of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modi ed. We call such a technique a telltale tamper-proo ng method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quantiz...

Journal: :IACR Cryptology ePrint Archive 2004
Mahalingam Ramkumar Nasir D. Memon

Key pre-distribution (KPD) schemes, are inherently trade-offs between security and complexity, and are perhaps well suited for securing large-scale deployments of resource constrained nodes without persistent access to a trusted authority (TA). However, the need to offset their inherent security limitations, calls for some degree of tamper-resistance of nodes. Obviously, if absolute tamper-resi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید