ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
10
views
14
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,326
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2009
Cumulative Attestation Kernels for Embedded Systems
other
Author(s):
Michael LeMay
,
Carl A. Gunter
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Most cited references
14
Record
: found
Abstract
: not found
Article
: not found
Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
Makoto Matsumoto
,
Takuji Nishimura
(1998)
0
comments
Cited
165
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Electromagnetic Analysis: Concrete Results
Karine Gandolfi
,
Christophe Mourtel
,
Francis Olivier
(2001)
0
comments
Cited
74
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Low cost attacks on tamper resistant devices
Ross Anderson
,
Markus Kuhn
(1998)
0
comments
Cited
36
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 655-670
DOI:
10.1007/978-3-642-04444-1_40
SO-VID:
c2a77e9a-35ef-4347-a514-2c8d157397c7
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
pp. 424
Secure Evaluation of Private Linear Branching Programs with Medical Applications
pp. 37
The Coremelt Attack
pp. 303
A Privacy Preservation Model for Facebook-Style Social Network Systems
pp. 440
Keep a Few: Outsourcing Data While Maintaining Confidentiality
pp. 505
Isolating JavaScript with Filters, Rewriting, and Wrappers
pp. 655
Cumulative Attestation Kernels for Embedded Systems
Similar content
2,326
New Attestation Based Security Architecture for In-Vehicle Communication
Authors:
Hisashi Oguma
,
Akira Yoshioka
,
Makoto Nishikawa
…
Quantification of the relative efficiency of factory surveillance in the disclosure of tuberculosis lesions in attested Irish cattle.
Authors:
J O'Keeffe
,
Corinne S. Martin
,
Declan A E Costello
…
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
Authors:
Luca Wilke
,
Jan Wichelmann
,
Florian Sieck
…
See all similar
Cited by
6
Cyber–Physical Security of a Smart Grid Infrastructure
Authors:
Tiffany Hyun-Jin Kim
,
B. Sinopoli
,
A. Perrig
…
Smart-grid security issues
Authors:
H. Khurana
,
M Hadley
,
Ning Lu
…
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures
Authors:
Robin Berthier
,
Stephen Reid McLaughlin
,
Saman Zonouz
…
See all cited by