Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,973,504 papers from all fields of science
Search
Sign In
Create Free Account
Hardware restriction
Known as:
Hardware DRM
, Secure boot
, Hardware restrictions
Expand
A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components. The hardware restriction scheme may…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
ARM architecture
Android
Anti-tamper software
App Store
Expand
Broader (2)
Digital rights management
Proprietary hardware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
EnclaveDB: A Secure Database Using SGX
Christian Priebe
,
K. Vaswani
,
Manuel Costa
IEEE Symposium on Security and Privacy
2018
Corpus ID: 3300993
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and freshness for data and queries. EnclaveDB…
Expand
Highly Cited
2017
Highly Cited
2017
REM: Resource-Efficient Mining for Blockchains
Fan Zhang
,
Ittay Eyal
,
Robert Escriva
,
A. Juels
,
R. V. Renesse
IACR Cryptology ePrint Archive
2017
Corpus ID: 1209977
Blockchains show promise as potential infrastructure for financial transaction systems. The security of blockchains today…
Expand
Highly Cited
2016
Highly Cited
2016
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang
,
Ethan Cecchetti
,
Kyle Croman
,
A. Juels
,
E. Shi
Conference on Computer and Communications…
2016
Corpus ID: 14281802
Smart contracts are programs that execute autonomously on blockchains. Their key envisioned uses (e.g. financial instruments…
Expand
Highly Cited
2016
Highly Cited
2016
XPIR : Private Information Retrieval for Everyone
C. A. Melchor
,
Joris Barrier
,
Laurent Fousse
,
M. Killijian
Proceedings on Privacy Enhancing Technologies
2016
Corpus ID: 8321138
Abstract A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while…
Expand
Highly Cited
2015
Highly Cited
2015
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
Yuanzhong Xu
,
Weidong Cui
,
Marcus Peinado
IEEE Symposium on Security and Privacy
2015
Corpus ID: 6344906
The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long…
Expand
Highly Cited
2014
Highly Cited
2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Cheng-Kang Chu
,
Sherman S. M. Chow
,
Wen-Guey Tzeng
,
Jianying Zhou
,
R. Deng
IEEE Transactions on Parallel and Distributed…
2014
Corpus ID: 13030328
Data sharing is an important functionality in cloud storage. In this paper, we show how to securely, efficiently, and flexibly…
Expand
Highly Cited
2013
Highly Cited
2013
Orthogonal Security with Cipherbase
A. Arasu
,
Spyros Blanas
,
+4 authors
R. Venkatesan
Conference on Innovative Data Systems Research
2013
Corpus ID: 19007013
This paper describes the design of the Cipherbase system. Cipherbase is a full-fledged SQL database system that achieves high…
Expand
2007
2007
Combating Double-Spending Using Cooperative P2P Systems
Ivan Osipkov
,
Eugene Y. Vasserman
,
Nicholas Hopper
,
Yongdae Kim
IEEE International Conference on Distributed…
2007
Corpus ID: 8097408
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those…
Expand
Highly Cited
2005
Highly Cited
2005
Location verification using secure distance bounding protocols
Dave Singelée
,
B. Preneel
IEEE International Conference on Mobile Adhoc and…
2005
Corpus ID: 3777434
Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password…
Expand
Highly Cited
2001
Highly Cited
2001
Secure Human Identification Protocols
Nicholas Hopper
,
M. Blum
International Conference on the Theory and…
2001
Corpus ID: 5079820
One interesting and important challenge for the cryptologic community is that of providing secure authentication and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE