ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
9
views
14
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,464
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2009
Cumulative Attestation Kernels for Embedded Systems
other
Author(s):
Michael LeMay
,
Carl A. Gunter
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Most cited references
14
Record
: found
Abstract
: not found
Article
: not found
Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
Makoto Matsumoto
,
Takuji Nishimura
(1998)
0
comments
Cited
164
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Electromagnetic Analysis: Concrete Results
Karine Gandolfi
,
Christophe Mourtel
,
Francis Olivier
(2001)
0
comments
Cited
74
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Low cost attacks on tamper resistant devices
Ross Anderson
,
Markus Kuhn
(1998)
0
comments
Cited
36
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 655-670
DOI:
10.1007/978-3-642-04444-1_40
SO-VID:
c2a77e9a-35ef-4347-a514-2c8d157397c7
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
pp. 424
Secure Evaluation of Private Linear Branching Programs with Medical Applications
pp. 37
The Coremelt Attack
pp. 303
A Privacy Preservation Model for Facebook-Style Social Network Systems
pp. 440
Keep a Few: Outsourcing Data While Maintaining Confidentiality
pp. 505
Isolating JavaScript with Filters, Rewriting, and Wrappers
pp. 655
Cumulative Attestation Kernels for Embedded Systems
Similar content
2,464
Is a CT-scan of the medial clavicle epiphysis a good exam to attest to the 18-year threshold in forensic age estimation?
Authors:
Tyffanie Houpert
,
Camille Rérolle
,
Frederic Savall
…
A normative approach to attest digital discrimination
Authors:
Does genetic population structure of Ambrosina bassii L. (Araceae, Ambrosineae) attest a post-Messinian land-bridge between Sicily and Africa?
Authors:
Angelo Troìa
,
Francesco Raimondo
,
Anna Geraci
See all similar
Cited by
6
Cyber–Physical Security of a Smart Grid Infrastructure
Authors:
Tiffany Hyun-Jin Kim
,
B. Sinopoli
,
A. Perrig
…
Smart-grid security issues
Authors:
H. Khurana
,
M Hadley
,
Ning Lu
…
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures
Authors:
Robin Berthier
,
Stephen Reid McLaughlin
,
Saman Zonouz
…
See all cited by