The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November-December (2007 vol.24)
pp: 534
Kevin Schutz , Atmel
ABSTRACT
Counterfeiting of high-tech products is a major concern today. This sidebar discusses cryptographic protocols that offer powerful turnkey solutions for various embedded systems to counter this problem. Simple, cost-effective hardware solutions offer turnkey protection against today's common threats.
INDEX TERMS
authentication, turnkey, cryptographic protocols, counterfeiting
CITATION
Kevin Schutz, "OEM Component Authentication", IEEE Design & Test of Computers, vol.24, no. 6, pp. 534, November-December 2007, doi:10.1109/MDT.2007.199
REFERENCES
1. B. Jun, "Attack of the Clones: Building Clone-Resistant Products," Proc. RSA Conf. Cryptography Research 2006 http://www.cryptography.com/resources/whitepapers Clone-Resistance2006.pdf
2. "Secure Your Embedded Devices," application note, Atmel 2006 http://www.atmel.com/dyn/resources/prod_documents doc6528.pdf.
31 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool