Issue No. 06 - November-December (2007 vol. 24)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MDT.2007.199
Kevin Schutz , Atmel
Counterfeiting of high-tech products is a major concern today. This sidebar discusses cryptographic protocols that offer powerful turnkey solutions for various embedded systems to counter this problem. Simple, cost-effective hardware solutions offer turnkey protection against today's common threats.
authentication, turnkey, cryptographic protocols, counterfeiting
Kevin Schutz, "OEM Component Authentication", IEEE Design & Test of Computers, vol. 24, no. , pp. 534, November-December 2007, doi:10.1109/MDT.2007.199