-
2
-
-
70449509154
-
SecSens - Security architecture for wireless sensor networks
-
Jun.
-
F. Bagci, T. Ungerer, and N. Bagherzadeh, "SecSens - Security architecture for wireless sensor networks," Proceedings of International Conference on Sensor Technologies and Applications, pp. 449-454, Jun. 2009.
-
(2009)
Proceedings of International Conference on Sensor Technologies and Applications
, pp. 449-454
-
-
Bagci, F.1
Ungerer, T.2
Bagherzadeh, N.3
-
3
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Jun.
-
G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," Proceedings of ACM/IEEE Design Automation Conference, pp. 9-14, Jun. 2007.
-
(2007)
Proceedings of ACM/IEEE Design Automation Conference
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
4
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in CHES, 2007, pp. 63-80.
-
CHES, 2007
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
5
-
-
59849094470
-
Comb capacitor structures for on-chip physical uncloneable function
-
Feb.
-
D. Roy, J. Klootwijk, N. Verhaegh, H. Roosen, and R. Wolters, "Comb capacitor structures for on-chip physical uncloneable function," IEEE Transactions on Semiconductor Manufacturing, vol. 22, no. 1, pp. 96-102, Feb. 2009.
-
(2009)
IEEE Transactions on Semiconductor Manufacturing
, vol.22
, Issue.1
, pp. 96-102
-
-
Roy, D.1
Klootwijk, J.2
Verhaegh, N.3
Roosen, H.4
Wolters, R.5
-
6
-
-
33750726983
-
Read-proof hardware from protective coatings
-
P. Tuyls, G. J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, and R. Wolters, "Read-proof hardware from protective coatings," in CHES, 2006, pp. 369-383.
-
CHES, 2006
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Skoric, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
9
-
-
33744736314
-
Digital camera identification from sensor pattern noise
-
Jun.
-
J. Lukas, J. Fridrich, and M. Goljan, "Digital camera identification from sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205-214, Jun. 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 205-214
-
-
Lukas, J.1
Fridrich, J.2
Goljan, M.3
-
10
-
-
46449138830
-
Controlled physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Controlled physical random functions," Proceedings of Computer Security Applications Conference, pp. 149-160, 2002.
-
(2002)
Proceedings of Computer Security Applications Conference
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
11
-
-
3242749566
-
-
Massachusetts Institute of Technology, Tech. Rep.
-
R. Pappu, "Physical one-way functions," Massachusetts Institute of Technology, Tech. Rep., 2001.
-
(2001)
Physical One-way Functions
-
-
Pappu, R.1
-
12
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
June
-
G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," Proceedings of IEEE/ACM Design Automation Conference, pp. 9-14, June 2007.
-
(2007)
Proceedings of IEEE/ACM Design Automation Conference
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
13
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
May
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan detection using IC fingerprinting," Proceedings of IEEE Symposium on Security and Privacy, pp. 296-310, May 2007.
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
15
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan.-Feb.
-
M.-D. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Design Test of Computers, vol. 27, no. 1, pp. 48-65, Jan.-Feb. 2010.
-
(2010)
IEEE Design Test of Computers
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.-D.1
Devadas, S.2
|