Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PUF
biblio
Reinforcement of IoT Open Platform Security using PUF -based Device Authentication
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
Internet of Things
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
PUF
authentication
IoT security
information and communication technology
composability
convergence
Physical Unclonable Function
device authentication
IoT Open Platform
biblio
PUF-based IoT Device Authentication Scheme on IoT Open Platform
Submitted by aekwall on Fri, 09/30/2022 - 2:46pm
Human behavior
OCF Iotivity
device authentication
PUF
Physical Unclonable Function
information and communication technology
IoT security
standards
composability
security
Resiliency
Metrics
pubcrawl
Computer crime
authentication
Internet of Things
IoT
biblio
Testing and Reliability Enhancement of Security Primitives
Submitted by aekwall on Wed, 04/13/2022 - 10:15am
Hardware
pubcrawl
Resiliency
Entropy
Very large scale integration
Layout
test
Physical Unclonable Function
Random variables
aging
Digital Sensor
FIA
PUF
SCA
trng
Damage Assessment
biblio
Lightweight and Reconfigurable Security Architecture for Internet of Things devices
Submitted by grigby1 on Tue, 01/25/2022 - 4:49pm
IoT
Resiliency
resilience
PUF
pubcrawl
Protocols
Physical Unclonable Function
ML attack
machine learning
Resilient Security Architectures
Internet of Things
FPGA
Cybersecurity
Conferences
computer architecture
composability
Autonomic Security
authentication
biblio
Secure IoT Device Authentication Scheme using Key Hiding Technology
Submitted by grigby1 on Thu, 08/12/2021 - 4:23pm
Metrics
WBC
software reliability
Software
security
Resiliency
resilience
PUF
pubcrawl
authentication
Market research
IoT security
IoT device
information and communication technology
Human behavior
Hardware
device authentication
composability
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
FPGA IP Obfuscation Using Ring Oscillator Physical Unclonable Function
Submitted by aekwall on Mon, 11/09/2020 - 1:31pm
logic design
ring oscillator physical unclonable function
ring oscillator based physical unclonable function
Ring Oscillator
Resiliency
PUF
pubcrawl
policy-based governance
Oscillators
logic obfuscation
Logic gates
composability
IP piracy
IP obfuscation
hardware obfuscation
FPGA IP obfuscation
FPGA based IP protection scheme
FPGA based designs
FPGA
field programmable gate arrays
Cryptography
biblio
Machine Learning Based IoT Edge Node Security Attack and Countermeasures
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
noninvasive architecture independent machine learning attack
cloned PUF devices
Cloning
cloning accuracy
highly connected ecosystem
IoT edge node security attack
machine-learning based countermeasure
malicious attack
malicious PUF modeling
authentic PUFs
physically unclonable functions
PUF
PUF architecture
PUF designs
PUF structure
two-stage brute force attack model
ubiquitous computing devices
brute force attacks
machine learning
Internet of Things
security
Cloud Computing
Servers
computer network security
Protocols
authentication
computer architecture
Cryptography
cloud server
pubcrawl
IoT networks
IoT
IoT devices
learning (artificial intelligence)
Human Factors
policy-based governance
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
Design of a Chaotic Oscillator based Model Building Attack Resistant Arbiter PUF
Submitted by grigby1 on Fri, 04/24/2020 - 12:02pm
PUF
Monte Carlo analysis
Monte Carlo methods
oscillating behaviors
oscillating systems
Oscillators
physical unclonable functions
privacy
pubcrawl
Modeling Attacks
PUF architecture
resilience
Resiliency
Resistance
security
security of data
Unclonability
arbiter PUF
Metrics
Measurement
Mathematical model
learning (artificial intelligence)
Integrated circuit modeling
FPGA
field programmable gate arrays
Cryptography
conventional machine learning
composability
Chua's oscillator circuit
Chua's Oscillator
chaotic oscillator
chaotic behaviour
chaos
1
2
3
next ›
last »