메뉴 건너뛰기




Volumn , Issue , 2008, Pages 146-153

Anti-counterfeiting with a random pattern

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL ARITHMETIC;

EID: 55849120197     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2008.12     Document Type: Conference Paper
Times cited : (28)

References (16)
  • 2
    • 34249824886 scopus 로고    scopus 로고
    • Faking out the fakers
    • June
    • E. Jordans, "Faking out the fakers," BusinessWeek, pp. 76-80, June 2007.
    • (2007) BusinessWeek , pp. 76-80
    • Jordans, E.1
  • 5
    • 33745654539 scopus 로고    scopus 로고
    • P. Tuyls and L. Batina, RFID-tags for anti-counterfeiting, in Proceedings of The Cryptographers' Track at the RSA Conference (CT-RSA) 2006, ser. Lecture Notes in Computer Science, D. Pointcheval, Ed., 3860. Springer, 2006, pp. 115-131.
    • P. Tuyls and L. Batina, "RFID-tags for anti-counterfeiting," in Proceedings of The Cryptographers' Track at the RSA Conference (CT-RSA) 2006, ser. Lecture Notes in Computer Science, D. Pointcheval, Ed., vol. 3860. Springer, 2006, pp. 115-131.
  • 6
    • 55849083428 scopus 로고    scopus 로고
    • P. Tuyls, Grey-box cryptography: Physical unclonable functions, in Proceedings of the 3rd Europeal Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), ser. Lecture Notes in Computer Science, L. Buttyán, V. D. Gligor, and D. Westhoff, Eds., 4357. Springer, 2006, pp. 3-5.
    • P. Tuyls, "Grey-box cryptography: Physical unclonable functions," in Proceedings of the 3rd Europeal Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), ser. Lecture Notes in Computer Science, L. Buttyán, V. D. Gligor, and D. Westhoff, Eds., vol. 4357. Springer, 2006, pp. 3-5.
  • 7
    • 55849089473 scopus 로고    scopus 로고
    • Silicon physical unknown functions and secure smart-cards
    • MIT Computer Science and Artificial Intelligence Laboratory, Tech. Rep. MIT-LCS-TR-833, May
    • B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical unknown functions and secure smart-cards," MIT Computer Science and Artificial Intelligence Laboratory, Tech. Rep. MIT-LCS-TR-833, May 2002.
    • (2002)
    • Gassend, B.1    Clarke, D.2    van Dijk, M.3    Devadas, S.4
  • 8
    • 33750726983 scopus 로고    scopus 로고
    • Read-proof hardware from protective coatings
    • Cryptographic Hardware and Embedded Systems CHES 2006, L. Goubin and M. Matsui, Eds, Springer
    • P. Tuyls, G. J. Schrijen, B. Škoriá, J. van Geloven, N. Verhaegh, and R. Wolters, "Read-proof hardware from protective coatings," in Cryptographic Hardware and Embedded Systems (CHES 2006), ser. Lecture Notes in Computer Science, L. Goubin and M. Matsui, Eds., vol. 4249. Springer, 2006, pp. 369-383.
    • (2006) ser. Lecture Notes in Computer Science , vol.4249 , pp. 369-383
    • Tuyls, P.1    Schrijen, G.J.2    Škoriá, B.3    van Geloven, J.4    Verhaegh, N.5    Wolters, R.6
  • 9
    • 26444544536 scopus 로고    scopus 로고
    • Robust key extraction from physical uncloneable functions
    • Applied Cryptography and Network Security, Springer
    • B. Škoriá, P. Tuyls, and W. Ophey, "Robust key extraction from physical uncloneable functions," in Applied Cryptography and Network Security, ser. Lecture Notes in Computer Science, vol. 3531. Springer, 2005, pp. 407-422.
    • (2005) ser. Lecture Notes in Computer Science , vol.3531 , pp. 407-422
    • Škoriá, B.1    Tuyls, P.2    Ophey, W.3
  • 10
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • Cryptographic Hardware and Embedded Systems CHES 2007, Springer
    • J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Cryptographic Hardware and Embedded Systems (CHES 2007), ser. Lecture Notes in Computer Science, vol. 4727. Springer, 2007, pp. 63-80.
    • (2007) ser. Lecture Notes in Computer Science , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 11
    • 26444487655 scopus 로고    scopus 로고
    • Information-theoretic security analysis of physical uncloneable functions
    • Financial Cryptography and Data Security, Springer
    • P. Tuyls, B. Škoriá, S. Stallinga, A. H. M. Akkermans, and W. Ophey, "Information-theoretic security analysis of physical uncloneable functions," in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, vol. 3570. Springer, 2005, pp. 141-155.
    • (2005) ser. Lecture Notes in Computer Science , vol.3570 , pp. 141-155
    • Tuyls, P.1    Škoriá, B.2    Stallinga, S.3    Akkermans, A.H.M.4    Ophey, W.5
  • 13
    • 0015285440 scopus 로고
    • Use of the Hough Transform to detect lines and curves in pictures
    • January
    • R. O. Duda and P. E. Hart, "Use of the Hough Transform to detect lines and curves in pictures," Communications of ACM, vol. 15, pp. 11-15, January 1972.
    • (1972) Communications of ACM , vol.15 , pp. 11-15
    • Duda, R.O.1    Hart, P.E.2
  • 15
    • 33749164066 scopus 로고    scopus 로고
    • Second Edition, John Wiley & Sons, Inc, ch. 10, pp
    • R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification (Second Edition). John Wiley & Sons, Inc., 2004, ch. 10, pp. 517-600.
    • (2004) Pattern Classification , pp. 517-600
    • Duda, R.O.1    Hart, P.E.2    Stork, D.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.