Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be carefully managed and protected, thus requiring embedded data management techniques. However, secure chips have severe hardware constraints which make traditional database techniques irrelevant. We previously addressed the problem of scaling down database techniques for the smart card and proposed the design of a DBMS kernel called PicoDBMS. This paper summarizes the learning obtained during an extensive performance analysis of PicoDBMS. Then it studies to which extent secure chips hardware evolution should impact the design of embedded data management techniques. Fina...
International audienceAmong other threats, secure components aresubjected to physical attacks whose ...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
International audienceAmong other threats, secure components are subjected tophysical attacks whose ...
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with ...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ub...
Smart card is today the most widespread secured portable computing device. Four years ago, we addres...
Abstract. Smartcards are themost secure portable computing device today.They have been used successf...
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory....
The increasing need for security has caused system designers to consider placing some security suppo...
Abstract--The technologies of computer security are more logic oriented. Designing a program with se...
Abstract: Every Smart card equipped with a microcontroller contains hardware-implemented software as...
Secure semiconductor devices usually destroy key material on tamper detection. However, data remanen...
Small units like chip cards (smart card) have the possibility of computing, storing and protecting d...
Among other threats, secure components are subjected to physical attacks whose aim is to recover the...
International audienceAmong other threats, secure components aresubjected to physical attacks whose ...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
International audienceAmong other threats, secure components are subjected tophysical attacks whose ...
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with ...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ub...
Smart card is today the most widespread secured portable computing device. Four years ago, we addres...
Abstract. Smartcards are themost secure portable computing device today.They have been used successf...
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory....
The increasing need for security has caused system designers to consider placing some security suppo...
Abstract--The technologies of computer security are more logic oriented. Designing a program with se...
Abstract: Every Smart card equipped with a microcontroller contains hardware-implemented software as...
Secure semiconductor devices usually destroy key material on tamper detection. However, data remanen...
Small units like chip cards (smart card) have the possibility of computing, storing and protecting d...
Among other threats, secure components are subjected to physical attacks whose aim is to recover the...
International audienceAmong other threats, secure components aresubjected to physical attacks whose ...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
International audienceAmong other threats, secure components are subjected tophysical attacks whose ...