-
1
-
-
24644449303
-
Secure software delivery and installation in embedded systems
-
R. H. Deng, editor, ISPEC 2005, of, Springer
-
A. Adelsbach, U. Huber, and A.-R. Sadeghi. Secure software delivery and installation in embedded systems. In R. H. Deng, editor, ISPEC 2005, volume 3439 of LNCS, pages 255-267. Springer, 2005.
-
(2005)
LNCS
, vol.3439
, pp. 255-267
-
-
Adelsbach, A.1
Huber, U.2
Sadeghi, A.-R.3
-
2
-
-
33749349575
-
-
W. Adi, R. Ernst, B. Soudan, and A. Hanoun. Vlsi design exchange with intellectual property protection in fpga environment using both secret and public-key cryptography. Emerging VLSI Technologies and Architectures, 2006. IEEE Computer Society Annual Symposium on, 00:6 pp.-, 2-3 March 2006.
-
W. Adi, R. Ernst, B. Soudan, and A. Hanoun. Vlsi design exchange with intellectual property protection in fpga environment using both secret and public-key cryptography. Emerging VLSI Technologies and Architectures, 2006. IEEE Computer Society Annual Symposium on, 00:6 pp.-, 2-3 March 2006.
-
-
-
-
3
-
-
51549090918
-
Using the Design Security Feature in Stratix II and Stratix II GX Devices
-
Altera Corporation
-
Altera Corporation. Using the Design Security Feature in Stratix II and Stratix II GX Devices. Document AN341 (v2.1), 2007.
-
(2007)
Document AN341 (v2.1)
-
-
-
5
-
-
79959557051
-
Reconfigurable trusted computing in hardware
-
New York, NY, USA, ACM
-
T. Eisenbarth, T. Güneysu, C. Paar, A. Sadeghi, D. Schellekens, and M. Wolf. Reconfigurable trusted computing in hardware. In STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 15-20, New York, NY, USA, 2007. ACM.
-
(2007)
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing
, pp. 15-20
-
-
Eisenbarth, T.1
Güneysu, T.2
Paar, C.3
Sadeghi, A.4
Schellekens, D.5
Wolf, M.6
-
6
-
-
51549092162
-
FIPS-180-2, Secure Hash Standard (SHS)
-
verfügbar unter
-
National Institute of Standards and Technology (NIST): FIPS-180-2, Secure Hash Standard (SHS), 2002. Elektronisch verfügbar unter http://www.itl.nist.gov/fipspubs/.
-
(2002)
Elektronisch
-
-
-
7
-
-
49749102763
-
A system architecture for reconfigurable trusted platforms
-
to appear
-
B. Glas, A. Klimm, O. Sander, K. D. Müller-Glaser, and J. Becker. A system architecture for reconfigurable trusted platforms. In DATE 2008, 2008. to appear.
-
(2008)
DATE 2008
-
-
Glas, B.1
Klimm, A.2
Sander, O.3
Müller-Glaser, K.D.4
Becker, J.5
-
8
-
-
84945300922
-
Comparative analysis of the hardware implementations of hash functions sha-1 and sha-512
-
T. Grembowski, R. Lien, K. Gaj, N. Nguyen, P. Bellows, J. Flidr, T. Lehman, and B. Scott. Comparative analysis of the hardware implementations of hash functions sha-1 and sha-512. LNCS, 2433:75-89, 2002.
-
(2002)
LNCS
, vol.2433
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
Lehman, T.7
Scott, B.8
-
9
-
-
38149048562
-
Security for mobile low power nodes in a personal area network by means of trusted platform modules
-
ESAS 2007
-
U. Grossmann, E. Berkhan, L. C. Jatoba, J. Ottenbacher, W. Stork, and K. D. Mueller-Glaser. Security for mobile low power nodes in a personal area network by means of trusted platform modules. LNCS, 4572:172-186, 2007. ESAS 2007.
-
(2007)
LNCS
, vol.4572
, pp. 172-186
-
-
Grossmann, U.1
Berkhan, E.2
Jatoba, L.C.3
Ottenbacher, J.4
Stork, W.5
Mueller-Glaser, K.D.6
-
10
-
-
51549086421
-
-
Herstellerinitiative Software HIS, available electronically at
-
Herstellerinitiative Software (HIS). HIS-Presentation 2004-05, 2005. available electronically at www.automotive-his.de.
-
(2005)
HIS-Presentation 2004-05
-
-
-
11
-
-
77953146174
-
-
Herstellerinitiative Software HIS, available electronically at
-
Herstellerinitiative Software (HIS). HIS Security Module Specification v1.1, 2006. available electronically at www.automotive-his.de.
-
(2006)
HIS Security Module Specification v1.1
-
-
-
13
-
-
1142270162
-
-
Prentice Hall
-
S. Pearson, B. Balacheff, L. Chen, D. Plaquin, and G. Proudler. Trusted Computing Platforms. Prentice Hall, 2003.
-
(2003)
Trusted Computing Platforms
-
-
Pearson, S.1
Balacheff, B.2
Chen, L.3
Plaquin, D.4
Proudler, G.5
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
36348937390
-
Modular system concept for FPGA-based Automotive Gateway
-
VDI-Berichte, VDI, Verein Deutscher Ingenieure
-
O. Sander, J. Becker, M. Hübner, M. Dreschmann, J. Luka, M. Traub, and T. Weber. Modular system concept for FPGA-based Automotive Gateway. In Electronic Systems for Vehicles, number 2000 in VDI-Berichte, pages 223-232. VDI, Verein Deutscher Ingenieure, 2007.
-
(2007)
Electronic Systems for Vehicles
, Issue.2000
, pp. 223-232
-
-
Sander, O.1
Becker, J.2
Hübner, M.3
Dreschmann, M.4
Luka, J.5
Traub, M.6
Weber, T.7
-
17
-
-
51549121721
-
-
Trusted Computing Group, Available electronically at, 2003
-
Trusted Computing Group. TPM main specification v1.2 - part 1 design principles. Available electronically at www.trustedcomputinggroup.org, 2003.
-
TPM main specification v1.2 - part 1 design principles
-
-
-
18
-
-
51549110078
-
-
Trusted Computing Group. Trusted computing platform alliance main specification version 1.1b. Available electronically at www. trustedcomputinggroup.org, 2003.
-
Trusted Computing Group. Trusted computing platform alliance main specification version 1.1b. Available electronically at www. trustedcomputinggroup.org, 2003.
-
-
-
-
19
-
-
51549088723
-
-
Xilinx Inc. Advanced Security Schemes for Spartan-3A/3AN/3A DSP FPGAs
-
Xilinx Inc. Advanced Security Schemes for Spartan-3A/3AN/3A DSP FPGAs. Document WP267 (v1.0), 2007.
-
(2007)
Document WP267 (v1.0)
-
-
-
20
-
-
33845587917
-
-
L. Yuan, G. Qu, L. Ghout, and A. Bouridane. Vlsi design ip protection: Solutions, new challenges, and opportunities. ahs, 0:469-476, 2006.
-
L. Yuan, G. Qu, L. Ghout, and A. Bouridane. Vlsi design ip protection: Solutions, new challenges, and opportunities. ahs, 0:469-476, 2006.
-
-
-
|