1991
DOI: 10.1147/sj.302.0206
|View full text |Cite
|
Sign up to set email alerts
|

Transaction Security System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0
3

Year Published

1998
1998
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 115 publications
(52 citation statements)
references
References 5 publications
0
44
0
3
Order By: Relevance
“…A protection measure is adequate if the assumed effort to break it supersedes the expected benefits of the attack scenario. The classic taxonomy [11] for hardware security distinguishes between low class, middle class, and high class attacker profiles. In reality, a more fine-grained classification might be necessary.…”
Section: B Fpga Design Security Issuesmentioning
confidence: 99%
“…A protection measure is adequate if the assumed effort to break it supersedes the expected benefits of the attack scenario. The classic taxonomy [11] for hardware security distinguishes between low class, middle class, and high class attacker profiles. In reality, a more fine-grained classification might be necessary.…”
Section: B Fpga Design Security Issuesmentioning
confidence: 99%
“…Для идентифицированных активов используется перечень угроз и их классифи-кация с учетом известных типовых разновидностей угроз [3]. Далее классифициру-емые угрозы сопоставляются с минимальным уровнем нарушителя, необходимым для реализации угрозы в соответствии с моделью Арбахама [6], [7]. На основе этого определяется вероятность возникновения угрозы, выраженная оценкой: низкая , средняя или высокая .…”
Section: реализация и оценка фрагмента защищенной системы умного домаunclassified
“…For exemple, the under voltage technique [2] or the combination of the cipher instruction search attack realised by M. Khun and described in [2] which consists in recognizing enciphered instructions from their effect and the use of a focused ion beam workstation to access the EEP-ROM. A taxonomy of attackers has been done in [1], to realise the fault attack describe above, we consider that we were a class II attacker (knowledge insider). In order to perform the scan, under voltage and cipher instruction search, the attacker must be a class III, i.e.…”
Section: Tate and Ate Pairingsmentioning
confidence: 99%