10 papers:
- ICPR-2014-ChengY #analysis
- Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
- ICALP-v1-2011-FaustPV #how
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (SF, KP, DV), pp. 391–402.
- SEFM-2007-CansellGM #verification
- Formal verification of tamper-evident storage for e-voting (DC, JPG, DM), pp. 329–338.
- SAC-2007-NguyenT #detection #kernel #towards
- Towards a tamper-resistant kernel rootkit detector (AQN, YT), pp. 276–283.
- SIGMOD-2006-PavlouS #analysis #database #forensics
- Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
- ICALP-2005-MoranN #encryption #protocol
- Basing Cryptographic Protocols on Tamper-Evident Seals (TM, MN), pp. 285–297.
- VLDB-2004-SnodgrassYC #detection
- Tamper Detection in Audit Logs (RTS, S(Y, CSC), pp. 504–515.
- TACAS-2004-VirtanenHVNE #verification
- Tampere Verification Tool (HV, HH, AV, JN, TE), pp. 153–157.
- LCTES-2003-ZhangPV #clustering
- Tamper-resistant whole program partitioning (TZ, SP, AVG), pp. 209–219.
- ASPLOS-2000-LieTMLBMH #architecture
- Architectural Support for Copy and Tamper Resistant Software (DL, CAT, MM, PL, DB, JCM, MH), pp. 168–177.