<--- Back to Details
First PageDocument Content
Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography
Date: 2016-05-17 22:04:37
Cryptography
Computer access control
Secret sharing
Pico
Authentication
Secure cryptoprocessor
Encryption
Security token
Polynomial
Public-key cryptography

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 2,07 MB

Share Document on Facebook

Similar Documents

O abordare inovatoare a sonorizării interactive  Pico JB Single board MP3 PLAYER

O abordare inovatoare a sonorizării interactive Pico JB Single board MP3 PLAYER

DocID: 1vqfr - View Document

PICO-SOLAR FOR ALL Author: Maarten Kleijn, Josh Sebastian and Martijn Veen Country: Tanzania Sector: Renewable Energy  CHALLENGE

PICO-SOLAR FOR ALL Author: Maarten Kleijn, Josh Sebastian and Martijn Veen Country: Tanzania Sector: Renewable Energy CHALLENGE

DocID: 1v6fg - View Document

PICO HF-1.2 Sensor 600 kHz Frequency, Micro-Miniature Acoustic Emission Sensor Description and Features  Operating Specifications

PICO HF-1.2 Sensor 600 kHz Frequency, Micro-Miniature Acoustic Emission Sensor Description and Features Operating Specifications

DocID: 1v649 - View Document

Consejo Superior  RESOLUCIÓN Nº 335 GENERAL PICO,  09 de octubre de 2013

Consejo Superior RESOLUCIÓN Nº 335 GENERAL PICO, 09 de octubre de 2013

DocID: 1v5SD - View Document

Advanced Optowave PRODUC T DATA SHEET PICO-IR-1064/GR-532/UV-355

Advanced Optowave PRODUC T DATA SHEET PICO-IR-1064/GR-532/UV-355

DocID: 1uS0P - View Document