共 50 条
- [1] License protection with a tamper-resistant token [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 223 - 237
- [2] StreamTo: Streaming content using a tamper-resistant token [J]. SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 601 - 612
- [3] Tamper-resistant ubiquitous data management [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (02): : 147 - 158
- [4] A Tamper-Resistant Authentication Scheme on Digital Image [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 867 - 872
- [6] Tamper-resistant software system based on a finite state machine [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 112 - 122
- [8] A New System Model of ERDRM Based on Tamper-resistant Technology [J]. KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 512 - 515
- [9] Token-based access to digital information [J]. HANDHELD AND UBIQUITOUS COMPUTING, PROCEEDINGS, 1999, 1707 : 234 - 245
- [10] Passive Design Technique for Tamper-Resistant Embedded System [J]. PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 427 - 430