Tom Caddy

According to our database1, Tom Caddy authored at least 19 papers between 2005 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Tamper Response.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Tamper Resistance.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Tamper Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Side-Channel Attacks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security Evaluation Criteria.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Random Number Testing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Penetration Testing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

FIPS 140-2.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Differential Power Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Common Criteria.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2005
Security Evaluation Criteria.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Tamper Response.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Tamper Resistance.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Tamper Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Side-Channel Attacks.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Penetration Testing.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

FIPS 140-2.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Differential Power Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Common Criteria.
Proceedings of the Encyclopedia of Cryptography and Security, 2005


  Loading...