Henrique Kawakami
Henrique Kawakami
Verified email at amazon.com
Title
Cited by
Cited by
Year
Security and system architecture: Comparison of android customizations
R Gallo, P Hongo, R Dahab, LC Navarro, H Kawakami, K Galvão, ...
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
192015
T-DRE: a hardware trusted computing base for direct recording electronic vote machines
R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
102010
On device identity establishment and verification
R Gallo, H Kawakami, R Dahab
European Public Key Infrastructure Workshop, 130-145, 2009
92009
Hardware security evaluation using assurance case models
H Kawakami, R Gallo, R Dahab, E Nascimento
2015 10th International Conference on Availability, Reliability and Security …, 2015
62015
FORTUNA-A probabilistic framework for early design stages of hardware-based secure systems
R Gallo, H Kawakami, R Dahab
2011 5th International Conference on Network and System Security, 184-191, 2011
62011
Case study: on the security of key storage on PCs
R Gallo, H Kawakami, R Dahab
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
42013
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent App. 16/023,564, 2019
32019
FORTUNA—A framework for the design and development of hardware-based secure systems
R Gallo, H Kawakami, R Dahab
Journal of Systems and Software 86 (8), 2063-2076, 2013
32013
SCuP-secure cryptographic microprocessor
R Gallo12, H Kawakami, R Dahab
32011
A hardware trusted computing base for direct recording electronic vote machines
R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo
Austin, Texas, USA, 2010
32010
A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory
R Branco, K Hu, H Kawakami, K Sun
2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018
22018
ACBuilder: A tool for hardware architecture security evaluation
H Kawakami, D Ott, HC Wong, R Dahab, R Gallo
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
12016
Hardware security module equipment with native implementation of a cryptographic key management communication protocol and remote confidence enhancement method for …
AB JÚNIOR, CPL Gouvea, FKA Yamamoto, GF Mandaji, AT Sasaki, ...
US Patent App. 16/639,963, 2020
2020
Per thread side channel attack protection
K Sun, K Hu, HDM Kawakami, R Branco
US Patent App. 16/584,373, 2020
2020
A framework for hardware security evaluation= Um framework para a avaliação de segurança de hardware
HM Kawakami
[sn], 2015
2015
Secure Methods for Device Identification by the use of the Data Flow Problem
RD HENRIQUE DE MEDEIROS KAWAKAMI, ROBERTO ALVES GALLO FILHO
BR Patent BR 10 2012 005795 6 A2, 2014
2014
MÉtodos Seguros De IdentificaÇÃo De Dispositivos Baseados No Problema Do Escoamento De Dados
D Ricardo, GR Alves Filho, KH De Medeiros
2014
External cipher and authentication device for use with keyboard units
GCSDA Henrique de Medeiros Kawakami, Roberto Alves Gallo Filho
WO Patent WO2005003932A1, 2005
2005
A Mathematical Model of Exploitation and Mitigation Techniques Using Set Theory
R Branco, H Kawakami
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
N Wahid, E Pardede
The system can't perform the operation now. Try again later.
Articles 1–20