메뉴 건너뛰기




Volumn 38, Issue 7, 2003, Pages 209-219

Tamper-resistant whole program partitioning

Author keywords

Mobile code; Program partitioning; Smart card; Tamper resistance

Indexed keywords

ALGORITHMS; CACHE MEMORY; COMPUTER SOFTWARE; CRYPTOGRAPHY; SECURITY OF DATA; SMART CARDS;

EID: 1542346135     PISSN: 03621340     EISSN: None     Source Type: Journal    
DOI: 10.1145/780731.780762     Document Type: Conference Paper
Times cited : (3)

References (17)
  • 2
    • 23544433874 scopus 로고    scopus 로고
    • Study on multi-application smart card
    • Jason Tey, Study on Multi-Application Smart Card, http://web.singnet.com.sg/~jasontey/project.htm
    • Tey, J.1
  • 3
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems
    • Springer-Verlag
    • P.C. Kocher, Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems, Proceedings Crypto'96, LNCS 1109, Springer-Verlag 1996, 104-113.
    • (1996) Proceedings Crypto'96, LNCS 1109 , pp. 104-113
    • Kocher, P.C.1
  • 5
    • 1542322455 scopus 로고    scopus 로고
    • The SUIF 2 compiler documentation set
    • Stanford University; Sep.
    • Standard SUIF Compiler Infrastructure, The SUIF 2 compiler documentation set, Stanford University, Sep.2000. http://suif.stanford.edu/suif/index.html.
    • (2000)
  • 6
    • 84948770439 scopus 로고    scopus 로고
    • Mach-SUIF backend compiler, The Machine-SUIF 2.1 compiler documentation set
    • Harvard University, Sep.
    • Mach-SUIF Backend Compiler, The Machine-SUIF 2.1 compiler documentation set. Harvard University, Sep. 2000, http://ececs.harvard.edu/hube/research/machsuif.html.
    • (2000)
  • 9
    • 1542352602 scopus 로고    scopus 로고
    • http://wwww.arm.com/app.nsf/html/security?OpenDocument&style= ARM_Powered_Products
  • 15
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • (W. Fumy, ed.), Lecture Notes in Computer Science; Springer-Verlag
    • D. Boneh, R. A. DeMillo, and R. J. Lipton, On the importance of checking cryptographic protocols for faults, Proceedings of EUROCRYPT '97 (W. Fumy, ed.), Lecture Notes in Computer Science, vol. 1233, Springer-Verlag, 1997, pp. 37-51.
    • (1997) Proceedings of EUROCRYPT '97 , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 16
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Technical Report 148, Department of Computer Science, University of Auckland, July
    • Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 17
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • R.J. Anderson, Editor, Springer, Verlag; Berlin
    • D. Aucsmith, Tamper Resistant Software: An Implementation, Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R.J. Anderson, Editor, Springer, Verlag, 1996, Berlin, pp.317-333.
    • (1996) Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science) , vol.1174 , pp. 317-333
    • Aucsmith, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.