Encyclopedia of Cryptography and Security 2011
DOI: 10.1007/978-1-4419-5906-5_303
|View full text |Cite
|
Sign up to set email alerts
|

Secure Element

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…A long enough list can be developed to mention the services provided by a secure element including detection of tampering attempts, storing the root of any authentication chain, storing and generating of private security keys, services regarding cryptography, secure management of system resources etc. [70] [71]. However, sometimes a secure element is defined by a programmable microcontroller with the construction objective to provide a secure environment for execution and storage.…”
Section: Secure Element (Se)mentioning
confidence: 99%
“…A long enough list can be developed to mention the services provided by a secure element including detection of tampering attempts, storing the root of any authentication chain, storing and generating of private security keys, services regarding cryptography, secure management of system resources etc. [70] [71]. However, sometimes a secure element is defined by a programmable microcontroller with the construction objective to provide a secure environment for execution and storage.…”
Section: Secure Element (Se)mentioning
confidence: 99%