Showing 261 - 280 results of 336 for search '"Physical Unclonable Function"', query time: 0.10s Refine Results
  1. 261

    Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments by Yohan Park, Daeun Ryu, Deokkyu Kwon, Youngho Park

    Published 2023-02-01
    “…The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. …”
    Get full text
    Article
  2. 262

    A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF by Yang An, Yuejiao Zhang, Wenjun Cao, Zhiyan Tong, Zhangqing He

    Published 2022-03-01
    “…Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol design because it can ensure a tamper-evident feature. …”
    Get full text
    Article
  3. 263

    A lightweight PUF-based secure group key agreement protocol for wireless sensor networks by Zheng, Yue, Liu, Wenye, Chang, Chip Hong

    Published 2024
    “…As group messaging is commonly used in WSNs for efficient message exchanges among sensor nodes, this paper presents a lightweight secure group key agreement protocol using Physical Unclonable Function (PUF) as a hardware root of trust. …”
    Get full text
    Conference Paper
  4. 264

    A PUF-based data-device hash for tampered image detection and source camera identification by Zheng, Yue, Cao, Yuan, Chang, Chip-Hong

    Published 2020
    “…The proposed image hash is generated by projecting the invariant image features into a physical unclonable function (PUF)-defined Bernoulli random space. …”
    Get full text
    Journal Article
  5. 265

    Reliable and modeling attack resistant authentication of Arbiter PUF in FPGA implementation with trinary quadruple response by Zalivaka, Siarhei S., Ivaniuk, Alexander A., Chang, Chip Hong

    Published 2020
    “…Arbiter-based physical unclonable function (A-PUF) has been widely regarded as a suitable lightweight security primitive for FPGA bitstream encryption and device authentication. …”
    Get full text
    Journal Article
  6. 266

    Spectral sensitivity near exceptional points as a resource for hardware encryption by Minye Yang, Liang Zhu, Qi Zhong, Ramy El-Ganainy, Pai-Yen Chen

    Published 2023-02-01
    “…In this work the authors demonstrate that the spectral sensitivity near exceptional points can be harnessed in electronic circuits to implement physically unclonable functions for security and communication applications.…”
    Get full text
    Article
  7. 267
  8. 268

    Chemical unclonable functions based on operable random DNA pools by Anne M. Luescher, Andreas L. Gimpel, Wendelin J. Stark, Reinhard Heckel, Robert N. Grass

    Published 2024-04-01
    “…Abstract Physical unclonable functions (PUFs) based on unique tokens generated by random manufacturing processes have been proposed as an alternative to mathematical one-way algorithms. …”
    Get full text
    Article
  9. 269

    Laser printed microelectronics by Liang Yang, Hongrong Hu, Alexander Scholz, Florian Feist, Gabriel Cadilha Marques, Steven Kraus, Niklas Maximilian Bojanowski, Eva Blasco, Christopher Barner-Kowollik, Jasmin Aghassi-Hagmann, Martin Wegener

    Published 2023-02-01
    “…Here, the authors propose laser printing as a facile process for fabricating printed electronics with minimum feature sizes below 1 µm and demonstrate functional diodes, memristors, and physically unclonable functions.…”
    Get full text
    Article
  10. 270

    Circuit design for security in internet-of-things application by Cheang, Bryan Hon Mun

    Published 2018
    “…Physically Unclonable Functions (PUF) have been an interest in the security technology world. …”
    Get full text
    Final Year Project (FYP)
  11. 271

    Study of a New Method of Radio-Sensor Identification of Radio-Electronic Devices by K. А. Boikov

    Published 2023-07-01
    “…The purpose of this work is to increase the protection of radio-electronic devices from illegal cloning, by studying a new physically unclonable functions (PUF) connected with the own electromagnetic radiation of a radio-electronic device. …”
    Get full text
    Article
  12. 272

    A PUF-based cryptographic security solution for IoT systems on chip by Alexandra Balan, Titus Balan, Marcian Cirstea, Florin Sandu

    Published 2020-11-01
    “…The mechanism employed in this approach uses physically unclonable functions (PUF) and symmetric cryptography in order to encrypt the transferred messages within the SoC between the microprocessor and its peripherals. …”
    Get full text
    Article
  13. 273

    Quantum Logic Locking for Security by Rasit Onur Topaloglu

    Published 2023-07-01
    “…In particular, we review physically unclonable functions (PUFs), obfuscation, and introduce quantum logic locking (QLL). …”
    Get full text
    Article
  14. 274

    Deep learning enhanced anti-counterfeiting security tags made from thin films by Low, Jing Yi

    Published 2023
    “…In this paper, we focus specifically on physical anti-counterfeiting methods and investigate the feasibility of using machine learning to improve the accuracy and efficiency of identifying and authenticating Physical Unclonable Functions (PUFs). Our study aims to enhance existing solutions by exploring the potential of machine learning models in the context of PUFs. …”
    Get full text
    Final Year Project (FYP)
  15. 275

    Machine learning and hardware security : challenges and opportunities by Regazzoni, Francesco, Bhasin, Shivam, Pour, Amir Ali, Alshaer, Ihab, Aydin, Furkan, Aysu, Aydin, Beroulle, Vincent, Di Natale, Giorgio, Franzon, Paul, Hely, David, Homma, Naofumi, Ito, Akira, Jap, Dirmanto, Kashyap, Priyank, Polian, Ilia, Potluri, Seetal, Ueno, Rei, Vatajelu, Elena-Ioana, Yli-Mäyry, Ville

    Published 2021
    “…This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. Later, practical model extraction attack based on electromagnetic side-channel measurements are demonstrated followed by a discussion of strategies to protect proprietary models by watermarking them.…”
    Get full text
    Journal Article
  16. 276

    Remote inspection of adversary-controlled environments by Johannes Tobisch, Sébastien Philippe, Boaz Barak, Gal Kaplun, Christian Zenger, Alexander Glaser, Christof Paar, Ulrich Rührmair

    Published 2023-10-01
    “…Our technique extends to large physical systems the application of physical unclonable functions for integrity protection. Its main applications are scenarios where parties are mutually distrustful and have privacy and security constraints. …”
    Get full text
    Article
  17. 277

    Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure by Ferucio Laurentiu Tiplea, Cristian Hristea, Rodica Bulai

    Published 2022-12-01
    “…To achieve these privacy levels, we use Physically Unclonable Functions (PUFs) to assure that the internal secret of the tag remains hidden from an adversary with invasive capabilities. …”
    Get full text
    Article
  18. 278

    Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN by Cuiran Li, Jixuan Wu, Zepeng Zhang, Anqi Lv

    Published 2023-12-01
    “…The algorithm uses physical unclonable functions and optimized Q-learning to ensure that the transmission path is reliable. …”
    Get full text
    Article
  19. 279

    Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy by Rameez Asif, Kinan Ghanem, James Irvine

    Published 2020-12-01
    “…A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. …”
    Get full text
    Article
  20. 280

    SRAM-Based PUF Readouts by Sergio Vinagrero, Honorio Martin, Alice de Bignicourt, Elena-Ioana Vatajelu, Giorgio Di Natale

    Published 2023-05-01
    “…Abstract Large-scale parameter characterization of Physical Unclonable Functions (PUFs) is of paramount importance in order to assess the quality and thus the suitability of such PUFs which would then be developed as an industrial-grade solution for hardware root of trust. …”
    Get full text
    Article