This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
OEM Component Authentication
November-December 2007 (vol. 24 no. 6)
pp. 534
Kevin Schutz, Atmel
Counterfeiting of high-tech products is a major concern today. This sidebar discusses cryptographic protocols that offer powerful turnkey solutions for various embedded systems to counter this problem. Simple, cost-effective hardware solutions offer turnkey protection against today's common threats.

1. B. Jun, "Attack of the Clones: Building Clone-Resistant Products," Proc. RSA Conf. Cryptography Research 2006 http://www.cryptography.com/resources/whitepapers Clone-Resistance2006.pdf
2. "Secure Your Embedded Devices," application note, Atmel 2006 http://www.atmel.com/dyn/resources/prod_documents doc6528.pdf.

Index Terms:
authentication, turnkey, cryptographic protocols, counterfeiting
Citation:
Kevin Schutz, "OEM Component Authentication," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 534, Nov.-Dec. 2007, doi:10.1109/MDT.2007.199
Usage of this product signifies your acceptance of the Terms of Use.