First Page | Document Content | |
---|---|---|
![]() Date: 2016-05-17 22:04:37Cryptography Computer access control Secret sharing Pico Authentication Secure cryptoprocessor Encryption Security token Polynomial Public-key cryptography | Add to Reading List |
![]() | 1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank StajanoDocID: 1nrDf - View Document |
![]() | Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2DocID: 1mSPc - View Document |
![]() | CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — GoldfingerDocID: 19URM - View Document |
![]() | SECURITY Magic Boxes and Boots: Security in HardwareDocID: 18QKR - View Document |
![]() | Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEEDocID: 18dmP - View Document |