-
1
-
-
84892342742
-
-
1st edn. Springer Publishing Company, Incorporated
-
Staake, T., Fleisch, E.: Countering Counterfeit Trade: Illicit Market Insights, Best-Practice Strategies, and Management Toolbox, 1st edn. Springer Publishing Company, Incorporated (2010)
-
(2010)
Countering Counterfeit Trade: Illicit Market Insights, Best-Practice Strategies, and Management Toolbox
-
-
Staake, T.1
Fleisch, E.2
-
2
-
-
0036505144
-
Next generation technologies to combat counterfeiting of electronic components
-
Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. IEEE Trans. on Components and Packaging Tech. 25, 175-176 (2002)
-
(2002)
IEEE Trans. on Components and Packaging Tech.
, vol.25
, pp. 175-176
-
-
Bastia, S.1
-
5
-
-
0037144430
-
Physical one-way functions
-
Pappu, R., et al.: Physical one-way functions. Science 297 (2002)
-
(2002)
Science
, vol.297
-
-
Pappu, R.1
-
6
-
-
84866683256
-
Comprehensive study of image-based physical function system
-
Submitted to
-
Shariati, S., Standaert, F.-X., Jacques, L., Macq, B.: Comprehensive study of image-based physical function system. Submitted to Journal of Cryptographic Engineering
-
Journal of Cryptographic Engineering
-
-
Shariati, S.1
Standaert, F.-X.2
Jacques, L.3
Macq, B.4
-
7
-
-
76649124351
-
Strong authentication with physical unclonable functions
-
Tuyls, P., Škorić, B.: Strong authentication with physical unclonable functions. In: Security, Privacy, and Trust in Modern Data Management, pp. 133-148 (2007)
-
(2007)
Security, Privacy, and Trust in Modern Data Management
, pp. 133-148
-
-
Tuyls, P.1
Škorić, B.2
-
9
-
-
33745654539
-
RFID-Tags for Anti-counterfeiting
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
10
-
-
77957133407
-
How to Strongly Link Data and its Medium: The Paper Case
-
Bulens, P., Standaert, F.-X., Quisquater, J.-J.: How to Strongly Link Data and its Medium: the Paper Case. IET Information Security 4(2), 125-136 (2010)
-
(2010)
IET Information Security
, vol.4
, Issue.2
, pp. 125-136
-
-
Bulens, P.1
Standaert, F.-X.2
Quisquater, J.-J.3
-
11
-
-
84866683249
-
Anti-counterfeiting: Mixing the physical and the digital world
-
Guajardo, J., Preneel, B., Sadeghi, A.-R., Tuyls, P. (eds.) Foundations for Forgery- Resilient Cryptographic Hardware, vol. 09282
-
Kirovski, D.: Anti-counterfeiting: Mixing the physical and the digital world. In: Guajardo, J., Preneel, B., Sadeghi, A.-R., Tuyls, P. (eds.) Foundations for Forgery- Resilient Cryptographic Hardware, vol. 09282 in Dagstuhl Seminar Proceedings (2010)
-
Dagstuhl Seminar Proceedings (2010)
-
-
Kirovski, D.1
-
12
-
-
44049108637
-
Fingerprinting documents and packaging
-
Buchanan, J.D.R., Cowburn, R.P., Jausovec, A.V., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D.A., Bryan, M.T.: Fingerprinting documents and packaging. Nature, 475 (2005)
-
(2005)
Nature
, vol.475
-
-
Buchanan, J.D.R.1
Cowburn, R.P.2
Jausovec, A.V.3
Petit, D.4
Seem, P.5
Xiong, G.6
Atkinson, D.7
Fenton, K.8
Allwood, D.A.9
Bryan, M.T.10
-
14
-
-
57349155782
-
Certifying authenticity via fiber-infused paper
-
Chen, Y., Mihçak, K., Kirovski, D.: Certifying authenticity via fiber-infused paper. SIGecom Exch. 5, 29-37 (2005)
-
(2005)
SIGecom Exch.
, vol.5
, pp. 29-37
-
-
Chen, Y.1
Mihçak, K.2
Kirovski, D.3
-
16
-
-
84866689983
-
-
Random profiles of laser marks.
-
Shariati, S., Standaert, F.-X., Jacques, L., Macq, B., Salhi, M.A., Antoine, P.: Random profiles of laser marks. In: WIC Symposium on Information Theory in the Benelux, pp. 27-34 (2010)
-
(2010)
WIC Symposium on Information Theory in the Benelux
, pp. 27-34
-
-
Shariati, S.1
Standaert, F.-X.2
Jacques, L.3
Macq, B.4
Salhi, M.A.5
Antoine, P.6
-
17
-
-
80051967839
-
A formalization of the security features of physical functions
-
Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X., Wachsmann, C.: A formalization of the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397-412 (2011)
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Standaert, F.X.4
Wachsmann, C.5
-
19
-
-
0004134542
-
-
Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems. The National Academies Press
-
Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems. Counterfeit Deterrent Features for the Next-Generation Currency Design. The National Academies Press (1993)
-
(1993)
Counterfeit Deterrent Features for the Next-Generation Currency Design
-
-
-
20
-
-
33750726983
-
Read-Proof Hardware from Protective Coatings
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
21
-
-
0038341105
-
Silicon physical random functions
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (November 2002)
-
ACM Conference on Computer and Communications Security (November 2002)
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
22
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13(10), 1200-1205 (2005)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
23
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
Digest of Technical Papers
-
Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: VLSI Circuits. Digest of Technical Papers, pp. 176-179 (2004)
-
(2004)
VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
24
-
-
38049015807
-
FPGA Intrinsic PUFs and Their Use for IP Protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
25
-
-
78651087085
-
Randomly driven fuzzy key extraction of uncloneable images
-
Shariati, S., Jacques, L., Standaert, F.-X., Macq, B., Salhi, M.A., Antoine, P.: Randomly driven fuzzy key extraction of uncloneable images. In: International Conference on Image Processing, ICIP (2010)
-
International Conference on Image Processing, ICIP (2010)
-
-
Shariati, S.1
Jacques, L.2
Standaert, F.-X.3
Macq, B.4
Salhi, M.A.5
Antoine, P.6
-
27
-
-
26444544536
-
Robust Key Extraction from Physical Uncloneable Functions
-
Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Škorić, B., Tuyls, P., Ophey, W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 407-422
-
-
Škorić, B.1
Tuyls, P.2
Ophey, W.3
-
28
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J.W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on VLSI Systems 13(10), 1200-1205 (2005)
-
(2005)
IEEE Transactions on VLSI Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Edward Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
29
-
-
72449124251
-
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Sunar, B.4
Tuyls, P.5
-
30
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
|