Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PUF
biblio
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Submitted by aekwall on Mon, 03/23/2020 - 1:21pm
PUF
random key generation
SRAM PUF
SRAM device
SRAM chips
SRAM chip
SRAM
PUF key generation mechanism
Private keys
fuzzy extractors
fuzzy extractor techniques
error correction coding methods
Error analysis
Arduino mega shield
adjustable memory-based PUF
key generation
IoT
error correction codes
physically unclonable functions
Random access memory
authentication
Metrics
pubcrawl
Human behavior
Resiliency
secret keys
private key cryptography
IoT devices
Internet of Things
encryption
Servers
Scalability
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
An efficient multi-factor authenticated key exchange with physically unclonable function
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
password
two factor authentication
Servers
secure PUF-MAKE protocol
secure physically unclonable function
Resiliency
PUF-MAKE setting
PUF-embedded device
PUF
pubcrawl
Protocols
authentication
multifactor authenticators
multifactor authentication
multifactor authenticated key exchange
Multi-factor authenticators
Metrics
message authentication
Key exchange
Human Factors
encryption
Cryptographic Protocols
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
biblio
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
mirrors
Transistors
traditional approaches
stage physical unclonable functions design
security of data
security applications
security
Resiliency
resilience
Reliability
PUF
pubcrawl
privacy
physical unclonable function (PUF)
modelling attacks
32-bit current mirror
Mathematical model
machine learning attacks
machine learning
lightweight electronics
learning (artificial intelligence)
Hash functions
enhancing security
Current Mirror PUF
Cryptography
composability
CMOS integrated circuits
asynchronous circuits
Arbiter-PUF
65nm CMOS technology
biblio
Robust IoT communication physical layer concept with improved physical unclonable function
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
Ring Oscillator
Microelectronics Security
Physical Unclonable Function
pubcrawl
PUF
PUF-interfacing communication physical layer hardware
random identification hardware
reliability problems
resilience
Resiliency
Metrics
robust IoT communication physical layer
robust IoT communication physical layer concept
robust monitoring concepts
Robustness
size 65.0 nm
Spectral analysis
suitable physics
tuning
computer network security
Asia
Bandwidth
client-to-cloud communication physical layer
Cloud Computing
cloud-interfacing point
CMOS
CMOS technology
composability
aging
Conferences
generated PUF word
Hardware
hardware concepts
improved physical unclonable function
Internet of Things
IoT concept
IoT-cloud-based communication
biblio
Hybrid silicon CMOS-carbon nanotube physically unclonable functions
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
nanotube array
Transistors
Silicon
security tokens
security
Resiliency
resilience
PUF circuit
PUF
pubcrawl
physically unclonable functions
Physically unclonable
nanotube transistors
analog silicon circuit
Microelectronics Security
Metrics
Metals
hybrid silicon CMOS-carbon nanotube
electronic devices
Contact resistance
Computational modeling
composability
CMOS analogue integrated circuits
CMOS
carbon nanotubes
carbon nanotube
biblio
True Random Number Generator Based on Ring Oscillator PUFs
Submitted by grigby1 on Thu, 05/24/2018 - 12:15pm
Cryptography
Human behavior
Metrics
pubcrawl
PUF
random key generation
resilience
Resiliency
Scalability
true random number generator
biblio
A highly reliable dual-arbiter PUF for lightweight authentication protocols
Submitted by grigby1 on Wed, 05/16/2018 - 1:41pm
lightweight security alternative
Switches
security primitive
RFIDs
RFID
Resiliency
resilience
Reliability
radio frequency identification
PUF
pubcrawl
Protocols
authentication
lightweight authentication protocols
integrated circuit reliability
increased security
human factor
Human behavior
Hardware Security
dual arbiter PUF design
delays
Cryptographic Protocols
Constrained Devices
BER
biblio
Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs
Submitted by grigby1 on Tue, 02/06/2018 - 1:55pm
message authentication
Ubiquitous Computing Security
ubiquitous computing
Support vector machines
Scalability
Resistance
Resiliency
resilience
PUF
pubcrawl
physical unclonable functions
physical unclonable function (PUF)
neural nets
Metrics
Arbiter-PUF
machine-learning
machine learning
low-cost pervasive devices
low-cost authentication
Logic gates
lightweight obfuscation
learning (artificial intelligence)
Human Factors
Human behavior
delays
authentication
Artificial Neural Networks
« first
‹ previous
1
2
3
next ›
last »