Physical unclonable function

Results: 48



#Item
1Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan  Developers seek to seamlessly integrate cyber

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:07:52
2Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
3ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

Add to Reading List

Source URL: security1.win.tue.nl

Language: English - Date: 2016-01-03 03:15:37
42013 IEEE Symposium on Security and Privacy  PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-04-05 19:56:34
5www.cost.eu/ict  COST Action no. IC1204 2012⏐2016

www.cost.eu/ict COST Action no. IC1204 2012⏐2016

Add to Reading List

Source URL: w3.cost.eu

Language: English - Date: 2013-05-30 08:33:11
6Securing RFID systems by detecting tag cloning Mikko Lehtonen1 , Daniel Ostojic2 , Alexander Ilic1 and Florian Michahelles1 1 2

Securing RFID systems by detecting tag cloning Mikko Lehtonen1 , Daniel Ostojic2 , Alexander Ilic1 and Florian Michahelles1 1 2

Add to Reading List

Source URL: www.im.ethz.ch

Language: English - Date: 2009-06-23 03:52:17
7A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-06-05 18:18:00
8HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA  Sunday, June 13th

HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2010-10-16 10:23:01
9ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2011-05-27 10:02:27
10HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:42:52