-
2
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, no. 12, pp. 993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
3
-
-
0023247970
-
Effcient and timely mutual authentication
-
January
-
D. J. Otway and O. Rees, "Effcient and timely mutual authentication," ACM SIGOPS Operating Systems Review, vol. 21, pp. 8-10, January 1987.
-
(1987)
ACM SIGOPS Operating Systems Review
, vol.21
, pp. 8-10
-
-
Otway, D.J.1
Rees, O.2
-
4
-
-
0002917347
-
Kerberos authentication and authorization system
-
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, "Kerberos authentication and authorization system," in Project Athena Technical Plan, 1987.
-
(1987)
Project Athena Technical Plan
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
5
-
-
0026630927
-
-
January
-
T. Y. Woo and S. S. Lam, "Authentication for distributed systems," vol. 25, no. 1, pp. 39-52, January 1992.
-
(1992)
Authentication for Distributed Systems
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.Y.1
Lam, S.S.2
-
6
-
-
33751574051
-
Attacking authentication protocols
-
J. Clark, "Attacking authentication protocols," High Integrity Systems, vol. 1, 1996.
-
(1996)
High Integrity Systems
, vol.1
-
-
Clark, J.1
-
8
-
-
84948699217
-
On preventing replay attacks on security protocols
-
CSREA Press
-
S. Malladi, J. Alves-foss, and R. B. Heckendorn, "On preventing replay attacks on security protocols," in Proceedings of the International Conference on Security and Management. CSREA Press, 2002, pp. 77-83.
-
(2002)
Proceedings of the International Conference on Security and Management
, pp. 77-83
-
-
Malladi, S.1
Alves-Foss, J.2
Heckendorn, R.B.3
-
11
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
S. T. King, P. M. Chen, Y. min Wang, C. Verbowski, H. J. Wang, and J. R. Lorch, "Subvirt: Implementing malware with virtual machines," in In IEEE Symposium on Security and Privacy, 2006, pp. 314-327.
-
(2006)
In IEEE Symposium on Security and Privacy
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
13
-
-
46449138830
-
Controlled physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Controlled physical random functions," in Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), 2002.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC)
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
14
-
-
48149093328
-
Physical unclonable functions and public-key crypto for FPGA IP protection
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Physical unclonable functions and public-key crypto for FPGA IP protection," in International Conference on Field Programmable Logic and Applications, 2007, pp. 189-195.
-
(2007)
International Conference on Field Programmable Logic and Applications
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
16
-
-
0034428343
-
IC identification circuit using device mismatch
-
K. Lofstrom, W. Daasch, and D. Taylor, "IC identification circuit using device mismatch," in Solid-State Circuits Conference, 2000. Digest of Technical Papers. ISSCC. 2000 IEEE International, 2000, pp. 372-373.
-
(2000)
Solid-State Circuits Conference, 2000. Digest of Technical Papers. ISSCC. 2000 IEEE International
, pp. 372-373
-
-
Lofstrom, K.1
Daasch, W.2
Taylor, D.3
-
17
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02)
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
18
-
-
70449359528
-
Silicon physical unclonable function resistant to a 1025-trial brute force attack in 90 nm cmos
-
S. Stanzione and G. Iannaccone, "Silicon physical unclonable function resistant to a 1025-trial brute force attack in 90 nm cmos," in Symposium on VLSI Circuits, 2009, pp. 116-117.
-
(2009)
Symposium on VLSI Circuits
, pp. 116-117
-
-
Stanzione, S.1
Iannaccone, G.2
-
19
-
-
0037144430
-
Physical one-way functions
-
September
-
R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, "Physical one-way functions," Science, vol. 297, pp. 2026-2030, September 2002.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
20
-
-
37149044968
-
Aegis: A single-chip secure processor
-
G. E. Suh, C. W. O'Donnell, and S. Devadas, "Aegis: A single-chip secure processor," IEEE Design and Test of Computers, vol. 24, no. 6, pp. 570-580, 2007.
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
21
-
-
23444439038
-
AEGIS: A single-chip secure processor
-
||, "AEGIS: A single-chip secure processor," in Elsevier Information Security Technical Report, vol. 10, 2005, pp. 63-73.
-
(2005)
Elsevier Information Security Technical Report
, vol.10
, pp. 63-73
-
-
-
22
-
-
49049105769
-
Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications," in 2008 IEEE International Conference on RFID, 2008, pp. 58-64.
-
(2008)
2008 IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
25
-
-
0023569922
-
Zero knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," in Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, pp. 210-217.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 210-217
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
|