共 50 条
- [41] Secure Key Management in Embedded Systems: A First Proposal PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 81 - 91
- [42] Tamper resistance - A cautionary note PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1996, : 1 - 11
- [43] A secure image authentication scheme for tamper detection and recovery IMAGING SCIENCE JOURNAL, 2012, 60 (04): : 219 - 233
- [44] A secure hierarchical fragile watermarking method with tamper localization FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 69 - +
- [45] Secure tamper localization in binary document image authentication KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 263 - 271
- [46] Secure audit logging with tamper-resistant hardware SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 73 - 84
- [47] Towards a secure, tamper-proof grid platform SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID: SPANNING THE WORLD AND BEYOND, 2006, : 373 - +
- [48] Managing obsolescence of embedded hardware and software in secure and trusted systems Frontiers of Engineering Management, 2020, 7 : 172 - 181
- [50] TRUSTED UNIX VERSION POINTS WAY TO SECURE EMBEDDED SYSTEMS COMPUTER DESIGN, 1991, 30 (07): : 43 - 43