References
- W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall,1998
- B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996.
- Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, "Security as a New Dimension in Embedded System Design", ACM, pp. 753-760, June 2004
- Common Vulnerabilities and Exposures. (http://cve.mitre.org/)
- S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper Resistance Mechanisms for Secure Embedded Systems," in Proc. Int. Coni VLSI Design, Jan. 2004
- O. Kommerling and M. G. Kuhn, "Design principles for tamper-resistant smartcard processors," in Proc. USENIX Workshop on Smartcard Technology (Smartcard '99),pp. 9-20, May 1999
- P. Kocher, J. Jaffe, and B. Jun, Introduction to differential power analysis and related attacks. (http://www.cryptography.com/resources/whitepapers/)
- D. Brumley and D. Boneh, "Remote Timing Attacks Are Practical ," in Proc. 12th USENIX Security Symp; pp. 1-14, Aug. 2003
- D. Boneh, R. DeMillo, and R. Lipton, "On the importance of checking cryptographic protocols for faults" , in Proc. of Eurocrypt'97, pp. 37-51, 1997
- S. Govindavajhala and A. W. Appel, "Using Memory Errors to Attack a Virtual Machine," in Proc. IEEE Symposium on Security and Privacy, pp. 154-165, May 2003
- K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in Proc. Cryptographic Hardware and Embedded Systems, pp. 251-261, 2001 https://doi.org/10.1007/3-540-44709-1_21
- G. Hoglund and G. McGraw, Exploiting Software: How to Break Code http://www.exploitingsoftware.com) , Addison- Wesley, 2004
- IPSec Working Group. http://www.ietf.org/html.charters/ipsec - charter .html
- SSL 3.0 Specification. http://wp.netscape.com/eng/ssl31
- Biometrics and Network Security. Prentice Hall PTR, 2003
- OpenIPMP. http://www.openipmp.org
- Internet Streaming Media Alliance. httpi/www.isma.tv/horne
- Discretix Technologies Ltd. (http://www.discretix.com)
- B. Yee, Using Secure Co-processors. PhD thesis, Carnegie Mellon University, 1994
- A. Arbaugh, D. 1. Farber, and 1. M. Smith, "A Secure and Reliable BootStrap Architecture," in Proc. of IEEE Symposium on Security and Privacy, pp. 6571, May 1997
- D. Lie, C. A. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware," in Proc. ACM Symposium on Operating Systems Principles, pp. 178-192, Oct. 2003
- G. C. Necula and P. Lee, "Proof-Carrying Code," Tech. Rep. MU-CS-96165,Carnegie Mellon University, Nov. 1996
- S. Ravi, A. Raghunathan, and N. Potlapally, u Securing wireless data: System architecture challenges," in Proc. Inti. Symp. System Synthesis, pp. 195-200, October 2002
- Next-Generation Secure Computing Base (NGSCB). Microsoft Inc. (http://www.microsoft.com/resources/ngscb/productinf o.mspx)
- Trusted Computing Group. (https:/www.trustedcomputinggroup.org/horne)