-
2
-
-
34249824886
-
Faking out the fakers
-
June
-
E. Jordans, "Faking out the fakers," BusinessWeek, pp. 76-80, June 2007.
-
(2007)
BusinessWeek
, pp. 76-80
-
-
Jordans, E.1
-
3
-
-
34347225586
-
RFID authentication protocol for anti-counterfeiting and privacy protection
-
IEEE, February
-
Y.-C. Chen, W.-L. Wang, and M.-S. Hwang, "RFID authentication protocol for anti-counterfeiting and privacy protection," in Proceedings of the 9th International Conference on Advanced Communication Technology, vol. 1. IEEE, February 2007, pp. 255-259.
-
(2007)
Proceedings of the 9th International Conference on Advanced Communication Technology
, vol.1
, pp. 255-259
-
-
Chen, Y.-C.1
Wang, W.-L.2
Hwang, M.-S.3
-
4
-
-
34548842212
-
Development and implementation of novel UHF paper-based RFID designs for anti-counterfeiting and security applications
-
IEEE, April
-
A. Rida, T. Wu, R. Li, and M. M. Tentzeris, "Development and implementation of novel UHF paper-based RFID designs for anti-counterfeiting and security applications," in Proceedings of IEEE International Workshop on Anti-Counterfeiting, Security, Identification 2007. IEEE, April 2007, pp. 52-56.
-
(2007)
Proceedings of IEEE International Workshop on Anti-Counterfeiting, Security, Identification 2007
, pp. 52-56
-
-
Rida, A.1
Wu, T.2
Li, R.3
Tentzeris, M.M.4
-
5
-
-
33745654539
-
-
P. Tuyls and L. Batina, RFID-tags for anti-counterfeiting, in Proceedings of The Cryptographers' Track at the RSA Conference (CT-RSA) 2006, ser. Lecture Notes in Computer Science, D. Pointcheval, Ed., 3860. Springer, 2006, pp. 115-131.
-
P. Tuyls and L. Batina, "RFID-tags for anti-counterfeiting," in Proceedings of The Cryptographers' Track at the RSA Conference (CT-RSA) 2006, ser. Lecture Notes in Computer Science, D. Pointcheval, Ed., vol. 3860. Springer, 2006, pp. 115-131.
-
-
-
-
6
-
-
55849083428
-
-
P. Tuyls, Grey-box cryptography: Physical unclonable functions, in Proceedings of the 3rd Europeal Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), ser. Lecture Notes in Computer Science, L. Buttyán, V. D. Gligor, and D. Westhoff, Eds., 4357. Springer, 2006, pp. 3-5.
-
P. Tuyls, "Grey-box cryptography: Physical unclonable functions," in Proceedings of the 3rd Europeal Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), ser. Lecture Notes in Computer Science, L. Buttyán, V. D. Gligor, and D. Westhoff, Eds., vol. 4357. Springer, 2006, pp. 3-5.
-
-
-
-
7
-
-
55849089473
-
Silicon physical unknown functions and secure smart-cards
-
MIT Computer Science and Artificial Intelligence Laboratory, Tech. Rep. MIT-LCS-TR-833, May
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical unknown functions and secure smart-cards," MIT Computer Science and Artificial Intelligence Laboratory, Tech. Rep. MIT-LCS-TR-833, May 2002.
-
(2002)
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
8
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Cryptographic Hardware and Embedded Systems CHES 2006, L. Goubin and M. Matsui, Eds, Springer
-
P. Tuyls, G. J. Schrijen, B. Škoriá, J. van Geloven, N. Verhaegh, and R. Wolters, "Read-proof hardware from protective coatings," in Cryptographic Hardware and Embedded Systems (CHES 2006), ser. Lecture Notes in Computer Science, L. Goubin and M. Matsui, Eds., vol. 4249. Springer, 2006, pp. 369-383.
-
(2006)
ser. Lecture Notes in Computer Science
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Škoriá, B.3
van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
9
-
-
26444544536
-
Robust key extraction from physical uncloneable functions
-
Applied Cryptography and Network Security, Springer
-
B. Škoriá, P. Tuyls, and W. Ophey, "Robust key extraction from physical uncloneable functions," in Applied Cryptography and Network Security, ser. Lecture Notes in Computer Science, vol. 3531. Springer, 2005, pp. 407-422.
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3531
, pp. 407-422
-
-
Škoriá, B.1
Tuyls, P.2
Ophey, W.3
-
10
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
Cryptographic Hardware and Embedded Systems CHES 2007, Springer
-
J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Cryptographic Hardware and Embedded Systems (CHES 2007), ser. Lecture Notes in Computer Science, vol. 4727. Springer, 2007, pp. 63-80.
-
(2007)
ser. Lecture Notes in Computer Science
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
11
-
-
26444487655
-
Information-theoretic security analysis of physical uncloneable functions
-
Financial Cryptography and Data Security, Springer
-
P. Tuyls, B. Škoriá, S. Stallinga, A. H. M. Akkermans, and W. Ophey, "Information-theoretic security analysis of physical uncloneable functions," in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, vol. 3570. Springer, 2005, pp. 141-155.
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3570
, pp. 141-155
-
-
Tuyls, P.1
Škoriá, B.2
Stallinga, S.3
Akkermans, A.H.M.4
Ophey, W.5
-
12
-
-
0032277043
-
Locating facial features with colour information
-
IEEE
-
X. Zhang, Y. Xu, and L. Du, "Locating facial features with colour information," in Proceedings of Fourth International Conference on Signal Processing (ICSP 98), vol. 2. IEEE, 1998, pp. 889-892.
-
(1998)
Proceedings of Fourth International Conference on Signal Processing (ICSP 98)
, vol.2
, pp. 889-892
-
-
Zhang, X.1
Xu, Y.2
Du, L.3
-
13
-
-
0015285440
-
Use of the Hough Transform to detect lines and curves in pictures
-
January
-
R. O. Duda and P. E. Hart, "Use of the Hough Transform to detect lines and curves in pictures," Communications of ACM, vol. 15, pp. 11-15, January 1972.
-
(1972)
Communications of ACM
, vol.15
, pp. 11-15
-
-
Duda, R.O.1
Hart, P.E.2
-
15
-
-
33749164066
-
-
Second Edition, John Wiley & Sons, Inc, ch. 10, pp
-
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification (Second Edition). John Wiley & Sons, Inc., 2004, ch. 10, pp. 517-600.
-
(2004)
Pattern Classification
, pp. 517-600
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
|