-
1
-
-
84889632274
-
Digital fingerprints for low-cost platforms using mems sensors
-
New York, NY, USA ACM
-
A. Aysu, N. F. Ghalaty, Z. Franklin, M. P. Yali, and P. Schaumont. Digital fingerprints for low-cost platforms using mems sensors. In Proceedings of the Workshop on Embedded Systems Security, WESS '13, pages 2:1-2:6, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Workshop on Embedded Systems Security, WESS '13
, pp. 21-26
-
-
Aysu, A.1
Ghalaty, N.F.2
Franklin, Z.3
Yali, M.P.4
Schaumont, P.5
-
4
-
-
84900399992
-
Acm hotmobile 2013 poster: Leveraging imperfections of sensors for fingerprinting smartphones
-
Nov.
-
S. Dey, N. Roy, W. Xu, and S. Nelakuditi. Acm hotmobile 2013 poster: Leveraging imperfections of sensors for fingerprinting smartphones. SIGMOBILE Mob. Comput. Commun. Rev., 17(3):21-22, Nov. 2013.
-
(2013)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.17
, Issue.3
, pp. 21-22
-
-
Dey, S.1
Roy, N.2
Xu, W.3
Nelakuditi, S.4
-
5
-
-
46449138830
-
Controlled physical random functions
-
Washington, DC, USA IEEE Computer Society.
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Controlled physical random functions. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC '02, pages 149-, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC '02
, pp. 149
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
6
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA ACM
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02, pages 148-160, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
7
-
-
38049015807
-
FPGA intrinsic pufs and their use for IP protection
-
Berlin, Heidelberg Springer-Verlag
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls. Fpga intrinsic pufs and their use for ip protection. In Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES '07, pages 63-80, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES '07
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
8
-
-
84866642869
-
Pufs: Myth, fact or busted? A security evaluation of physically unclonable functions (pufs) cast in silicon
-
Berlin, Heidelberg Springer-Verlag.
-
S. Katzenbeisser, U. Kocabaş, V. Rošzić, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann. Pufs: Myth, fact or busted? a security evaluation of physically unclonable functions (pufs) cast in silicon. In Proceedings of the 14th International Conference on Cryptographic Hardware and Embedded Systems, CHES'12, pages 283-301, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 14th International Conference on Cryptographic Hardware and Embedded Systems, CHES'12
, pp. 283-301
-
-
Katzenbeisser, S.1
Kocabaş, U.2
Rošzić, V.3
Sadeghi, A.-R.4
Verbauwhede, I.5
Wachsmann, C.6
-
9
-
-
34548237327
-
Testu01: A c library for empirical testing of random number generators
-
P. L'Ecuyur and R. Simard. Testu01: A c library for empirical testing of random number generators. ACM Transactions on Mathematical Software, 33(4):22-40, 2007.
-
(2007)
ACM Transactions on Mathematical Software
, vol.33
, Issue.4
, pp. 22-40
-
-
L'Ecuyur, P.1
Simard, R.2
-
10
-
-
70449645004
-
Uwave: Accelerometer-based personalized gesture recognition and its applications
-
Dec.
-
J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan. uwave: Accelerometer-based personalized gesture recognition and its applications. Pervasive Mob. Comput., 5(6):657-675, Dec. 2009.
-
(2009)
Pervasive Mob. Comput.
, vol.5
, Issue.6
, pp. 657-675
-
-
Liu, J.1
Zhong, L.2
Wickramasuriya, J.3
Vasudevan, V.4
-
11
-
-
84893428522
-
Identities for embedded systems enabled by physical unclonable functions
-
M. Fischlin and S. Katzenbeisser, editors Springer Berlin Heidelberg
-
D. Merli, G. Sigl, and C. Eckert. Identities for embedded systems enabled by physical unclonable functions. In M. Fischlin and S. Katzenbeisser, editors, Number Theory and Cryptography, Volume 8260 of Lecture Notes in Computer Science, pages 125-138. Springer Berlin Heidelberg, 2013.
-
(2013)
Number Theory and Cryptography, Volume 8260 of Lecture Notes in Computer Science
, pp. 125-138
-
-
Merli, D.1
Sigl, G.2
Eckert, C.3
-
13
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
New York, NY, USA ACM
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 237-249, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
14
-
-
84896446157
-
Multitouch gesture-based authentication
-
April
-
N. Sae-Bae, N. Memon, K. Isbister, and K. Ahmed. Multitouch gesture-based authentication. Information Forensics and Security, IEEE Transactions on, 9(4):568-582, April 2014.
-
(2014)
Information Forensics and Security, IEEE Transactions On
, vol.9
, Issue.4
, pp. 568-582
-
-
Sae-Bae, N.1
Memon, N.2
Isbister, K.3
Ahmed, K.4
-
15
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
New York, NY, USA ACM
-
G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Annual Design Automation Conference, DAC '07, pages 9-14, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 44th Annual Design Automation Conference, DAC '07
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
16
-
-
37149044968
-
Aegis: A single-chip secure processor
-
G. E. Suh, C. W. O'Donnell, and S. Devadas. Aegis: A single-chip secure processor. IEEE Design & Test of Computers, 24(6):570-580, 2007.
-
(2007)
IEEE Design & Test of Computers
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
17
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random functions
-
Washington, DC, USA IEEE Computer Society.
-
G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas. Design and implementation of the aegis single-chip secure processor using physical random functions. In Proceedings of the 32Nd Annual International Symposium on Computer Architecture, ISCA '05, pages 25-36, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 32Nd Annual International Symposium on Computer Architecture, ISCA '05
, pp. 25-36
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
19
-
-
84877622605
-
Sensec: Mobile security through passive sensing
-
J. Zhang, X. Wang, P. Wu, and J. Zhu. Sensec: Mobile security through passive sensing. 2013 International Conference on Computing, Networking and Communications (ICNC), 0:1128-1133, 2013.
-
(2013)
2013 International Conference on Computing, Networking and Communications (ICNC)
, pp. 1128-1133
-
-
Zhang, J.1
Wang, X.2
Wu, P.3
Zhu, J.4
|