Tamper resistance

Results: 197



#Item
11Dawn Raids  Dawn Raids – Top 10 Tips Before

Dawn Raids Dawn Raids – Top 10 Tips Before

Add to Reading List

Source URL: www.ediscovery.com

Language: English - Date: 2015-06-17 09:29:04
12Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 11 Nuclear Command and Control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 11 Nuclear Command and Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 17:03:00
13PRODUCT BRIEF  CryptoManager™ Infrastructure Secure Foundation for Connected Devices Connected products, including mobile phones and Internet of Things (IoT) devices have a critical need for security. Robust security s

PRODUCT BRIEF CryptoManager™ Infrastructure Secure Foundation for Connected Devices Connected products, including mobile phones and Internet of Things (IoT) devices have a critical need for security. Robust security s

Add to Reading List

Source URL: www.rambus.com

Language: English - Date: 2014-06-13 13:31:23
14Bibliography  [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–M Abadi, RM Needham,

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–M Abadi, RM Needham,

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 10:00:47
15healthKrypt™: Safeguarding Health Information 80% OF HEALTHCARE ORGANIZATIONS EXPERIENCE LOST AND STOLEN INFORMATION† Patient personal information and medical data breaches cost patients, providers and payors alike.

healthKrypt™: Safeguarding Health Information 80% OF HEALTHCARE ORGANIZATIONS EXPERIENCE LOST AND STOLEN INFORMATION† Patient personal information and medical data breaches cost patients, providers and payors alike.

Add to Reading List

Source URL: aventyn.com

Language: English - Date: 2009-11-04 19:10:07
16CLIP®CareLock: Safeguarding Health Information 80% OF HEALTHCARE ORGANIZATIONS EXPERIENCE LOST AND STOLEN INFORMATION† Patient personal information and medical data breaches cost patients, providers and payors alike.

CLIP®CareLock: Safeguarding Health Information 80% OF HEALTHCARE ORGANIZATIONS EXPERIENCE LOST AND STOLEN INFORMATION† Patient personal information and medical data breaches cost patients, providers and payors alike.

Add to Reading List

Source URL: www.aventyn.com

Language: English - Date: 2013-09-27 17:27:29
17Microsoft Word - TSB-166.doc

Microsoft Word - TSB-166.doc

Add to Reading List

Source URL: www.impco.ws

Language: English - Date: 2011-10-03 11:24:47
18Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin1,2, Shengli Liu1, Tsz Hon Yuen3, Robert H. Deng4, Kefei Chen5 ! 1. Shanghai Jiao Tong University, China

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin1,2, Shengli Liu1, Tsz Hon Yuen3, Robert H. Deng4, Kefei Chen5 ! 1. Shanghai Jiao Tong University, China

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-31 17:57:10
19SECURITY  Magic Boxes and Boots: Security in Hardware

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:35:31
20Computer Networks 31 Ž–860  Building a high-performance, programmable secure coprocessor Sean W. Smith ) , Steve Weingart  1

Computer Networks 31 Ž–860 Building a high-performance, programmable secure coprocessor Sean W. Smith ) , Steve Weingart 1

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:49:59