10 papers:
ICPR-2014-ChengY #analysis- Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
ICALP-v1-2011-FaustPV #how- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (SF, KP, DV), pp. 391–402.
SEFM-2007-CansellGM #verification- Formal verification of tamper-evident storage for e-voting (DC, JPG, DM), pp. 329–338.
SAC-2007-NguyenT #detection #kernel #towards- Towards a tamper-resistant kernel rootkit detector (AQN, YT), pp. 276–283.
SIGMOD-2006-PavlouS #analysis #database #forensics- Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
ICALP-2005-MoranN #encryption #protocol- Basing Cryptographic Protocols on Tamper-Evident Seals (TM, MN), pp. 285–297.
VLDB-2004-SnodgrassYC #detection- Tamper Detection in Audit Logs (RTS, S(Y, CSC), pp. 504–515.
TACAS-2004-VirtanenHVNE #verification- Tampere Verification Tool (HV, HH, AV, JN, TE), pp. 153–157.
LCTES-2003-ZhangPV #clustering- Tamper-resistant whole program partitioning (TZ, SP, AVG), pp. 209–219.
ASPLOS-2000-LieTMLBMH #architecture- Architectural Support for Copy and Tamper Resistant Software (DL, CAT, MM, PL, DB, JCM, MH), pp. 168–177.