共 50 条
- [1] Two-stage tamper response in tamper-resistant software [J]. IET SOFTWARE, 2016, 10 (03) : 81 - 88
- [2] Specifying and verifying hardware for tamper-resistant software [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 166 - 177
- [3] Delayed and controlled failures in tamper-resistant software [J]. INFORMATION HIDING, 2007, 4437 : 216 - +
- [4] Evaluation of tamper-resistant software deviating from structured programming rules [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 145 - 158
- [5] Method and system for providing tamper-resistant executable software [J]. 计算机安全, 2003, (06) : 70 - 70
- [7] Tamper-resistant software system based on a finite state machine [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 112 - 122
- [8] Tamper-resistant biometric IDs [J]. ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 160 - 175
- [10] Tamper-Resistant LikeJacking Protection [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 265 - 285