-
3
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
Ozturk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: IEEE International Conference on Pervasive Computing and Communications, pp. 170-178 (2008)
-
(2008)
IEEE International Conference on Pervasive Computing and Communications
, pp. 170-178
-
-
Ozturk, E.1
Hammouri, G.2
Sunar, B.3
-
4
-
-
33750702480
-
-
Simpson, E., Schaumont, P.: Offline hardware/software authentication for reconfigurable platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 311-323. Springer, Heidelberg (2006)
-
Simpson, E., Schaumont, P.: Offline hardware/software authentication for reconfigurable platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 311-323. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
48149093328
-
Physical unclonable functions and publickey crypto for FPGA IP protection
-
Guajardo, J., Kumar, S., Schrijen, GJ., Tuyls, P.: Physical unclonable functions and publickey crypto for FPGA IP protection. In: International Conference on Field Programmable Logic and Applications, pp. 189-195 (2007)
-
(2007)
International Conference on Field Programmable Logic and Applications
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
6
-
-
38049015807
-
-
Guajardo, J., Kumar, S.S., Schrijen, GJ., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
-
Guajardo, J., Kumar, S.S., Schrijen, GJ., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
-
-
-
7
-
-
33745654539
-
-
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 115-131. Springer, Heidelberg (2006)
-
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. In: Pervasive Computing and Communications Workshops, pp. 217-222 (2007)
-
(2007)
Pervasive Computing and Communications Workshops
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
10
-
-
45749153036
-
-
Hammouri, G., Sunar, B.: PUF-HB: A tamper-resilient HB based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 346-365. Springer, Heidelberg (2008)
-
Hammouri, G., Sunar, B.: PUF-HB: A tamper-resilient HB based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346-365. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
57049186627
-
Unclonable lightweight authentication scheme
-
Chen, L, Ryan, M.D, Wang, G, eds, ICICS 2008, Springer, Heidelberg
-
Hammouri, G., Ozturk, E., Birand, B., Sunar, B.: Unclonable lightweight authentication scheme. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 33-48. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5308
, pp. 33-48
-
-
Hammouri, G.1
Ozturk, E.2
Birand, B.3
Sunar, B.4
-
12
-
-
2642546539
-
Two factor authenticated key exchange (TAKE) protocol in public wireless LANs
-
Park, Y.M., Park, S.K.: Two factor authenticated key exchange (TAKE) protocol in public wireless LANs. IEICE Transactions on Communications E87-B(5), 1382-1385 (2004)
-
(2004)
IEICE Transactions on Communications
, vol.E87-B
, Issue.5
, pp. 1382-1385
-
-
Park, Y.M.1
Park, S.K.2
-
13
-
-
33750881526
-
A two-factor mobile authentication scheme for secure financial transactions
-
Pietro, R.D., Me, G., Strangio, M.: A two-factor mobile authentication scheme for secure financial transactions. In: International Conference on Mobile Business (ICMB 2005), pp. 28-34 (2005)
-
(2005)
International Conference on Mobile Business (ICMB
, pp. 28-34
-
-
Pietro, R.D.1
Me, G.2
Strangio, M.3
-
14
-
-
34547519982
-
Privacy preserving multi-factor authentication with biometrics
-
Bhargav-Spantzel, A., Sqicciarini, A., Modi, S., Young, M., Bertino, E., Elliott, S.: Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security 15(5), 529-560 (2007)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.5
, pp. 529-560
-
-
Bhargav-Spantzel, A.1
Sqicciarini, A.2
Modi, S.3
Young, M.4
Bertino, E.5
Elliott, S.6
-
17
-
-
0038341105
-
Silicon physical random functions
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (CCS 2002), pp. 148-160 (2002)
-
(2002)
ACM Conference on Computer and Communications Security (CCS
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
19
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
20
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
-
Price, W.L, Chaum, D, eds, EUROCRYPT 1987, Springer, Heidelberg
-
Chaum, D., Evertse, J.H., van de Graaf, J.: An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 127-141. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.304
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.H.2
van de Graaf, J.3
-
21
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
|