Issue No.06 - November-December (2007 vol.24)
Kevin Schutz , Atmel
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MDT.2007.199
Counterfeiting of high-tech products is a major concern today. This sidebar discusses cryptographic protocols that offer powerful turnkey solutions for various embedded systems to counter this problem. Simple, cost-effective hardware solutions offer turnkey protection against today's common threats.
authentication, turnkey, cryptographic protocols, counterfeiting
Kevin Schutz, "OEM Component Authentication", IEEE Design & Test of Computers, vol.24, no. 6, pp. 534, November-December 2007, doi:10.1109/MDT.2007.199