Back to Results
First PageMeta Content
Tamper resistance / Public-key cryptography / Power analysis / Encryption / Computer security / Timing attack / Password / Key size / Secure cryptoprocessor / Cryptography / Security / Espionage


Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE
Add to Reading List

Document Date: 2005-08-19 15:38:40


Open Document

File Size: 208,58 KB

Share Result on Facebook

Company

IBM / Los Alamos National Laboratory / Distributed Systems / ACM Press / Cryptographic Hardware / Embedded Systems / Trusted Computing Platform Alliance / Needham / Microsoft / Very Large Scale Integration Systems / /

Continent

Europe / /

Country

United Kingdom / /

Currency

USD / /

/

Facility

Carnegie Mellon University / bridge JANUARY/FEBRUARY / Dartmouth College / /

IndustryTerm

accelerator software / actual device / secure protocols / consumer-level chip / physical devices / credit card processing / e-commerce server / software config92 uration / microelectromechanical systems / defensible technology / manufacturing process / technology areas / private information server / privacy protocols / desktop applications / metal-oxide semiconductors / electronics / metal cans / infeasible exponential search / e - commerce / intractable exponential search / computing / security configuration software / security protocols / /

Organization

MIT / Usenix Assoc. / Dartmouth College / IEEE IEEE Computer Computer Society Society / Phi Beta Kappa / Carnegie Mellon University / IEEE COMPUTER SOCIETY / Swiss Army / Pattern Analysis and Machine Intelligence / /

Person

Peter Gutmann / Ross Anderson / Steve Weingart / Mike Bond / Paul Kocher / Kuhn / Ravi Pappu / /

/

Position

trusted mediator / guard / co-worker / hardware security architect / designer / representative / professor of computer science / auctioneer / careful programmer / CryptLib architect / Threats Perspective Editor / programmer / member / /

Product

Tenex / /

PublishedMedium

Computer Graphics / /

Technology

S/MIME / radiation / Information Technology / API / PKI / physically defensible technology / ATM / smart card / cloning / private key / SRAM / operating system / html / SSL / consumer-level chip / laser / cryptography / microelectromechanical systems / MEMS / semiconductors / privacy protocols / Mobile Computing / http / designing security protocols / flash / up requiring cryptography / /

URL

www.foo.bar’s / www.foo.bar / www.scs.carleton.ca / www.research.ibm.com / www.cs.dartmouth.edu / www.cs / http /

SocialTag