2014
DOI: 10.1260/1748-3018.8.3.267
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Memory Integrity Authentication Based on Bloom Filter

Abstract: Secure processor architectures can provide secure computing environments. All kinds of applications that need high security should be immune to both physical and software attacks through the secure architectures. Memory integrity verification is a key problem while implementing secure processors. This paper proposed a scheme called IV-BF to ensure data integrity. The scheme is one-level hash structure, and it has three advantages over existing mainstream hash tree based schemes: lower computation overhead, low… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Nianmin, Haifeng [19] proposed a method for ensuring data integrity. This one-level hash structure has three advantages over traditional hash trees: a lower computation overhead, a lower space overhead, and the ability to adjust the security level.…”
Section: Related Workmentioning
confidence: 99%
“…Nianmin, Haifeng [19] proposed a method for ensuring data integrity. This one-level hash structure has three advantages over traditional hash trees: a lower computation overhead, a lower space overhead, and the ability to adjust the security level.…”
Section: Related Workmentioning
confidence: 99%