Skip to search formSkip to main contentSkip to account menu

Hardware restriction

Known as: Hardware DRM, Secure boot, Hardware restrictions 
A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components. The hardware restriction scheme may… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and freshness for data and queries. EnclaveDB… 
Highly Cited
2017
Highly Cited
2017
Blockchains show promise as potential infrastructure for financial transaction systems. The security of blockchains today… 
Highly Cited
2016
Highly Cited
2016
Smart contracts are programs that execute autonomously on blockchains. Their key envisioned uses (e.g. financial instruments… 
Highly Cited
2016
Highly Cited
2016
Abstract A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while… 
Highly Cited
2015
Highly Cited
2015
The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long… 
Highly Cited
2014
Highly Cited
2014
Data sharing is an important functionality in cloud storage. In this paper, we show how to securely, efficiently, and flexibly… 
Highly Cited
2013
Highly Cited
2013
This paper describes the design of the Cipherbase system. Cipherbase is a full-fledged SQL database system that achieves high… 
2007
2007
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those… 
Highly Cited
2005
Highly Cited
2005
Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password… 
Highly Cited
2001
Highly Cited
2001
One interesting and important challenge for the cryptologic community is that of providing secure authentication and…