First Page | Document Content | |
---|---|---|
Date: 2018-03-13 07:04:44Cryptography Computer security Computer hardware Cyberwarfare ISO standards Hardware Trojan Hardware security module Secure cryptoprocessor Hardware security Trusted Platform Module Smart card | Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts thaAdd to Reading ListSource URL: backdoortolerance.orgDownload Document from Source WebsiteFile Size: 2,18 MBShare Document on Facebook |
1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank StajanoDocID: 1nrDf - View Document | |
Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2DocID: 1mSPc - View Document | |
CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — GoldfingerDocID: 19URM - View Document | |
SECURITY Magic Boxes and Boots: Security in HardwareDocID: 18QKR - View Document | |
Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEEDocID: 18dmP - View Document |