Suggested Topics within your search.
Suggested Topics within your search.
History of engineering and technology
3
Authentication
2
Cryptography
2
Internet of things
2
Technology: general issues
2
authentication
2
Access methods
1
Article
1
Authentication mechanisms
1
Authentication scheme
1
Block-chain
1
Blockchain
1
Computation theory
1
Computer Security
1
Computer science
1
Cyber security
1
Decision Making
1
Decision making
1
Decision making process
1
Delivery of Health Care
1
Duel game
1
Fault tolerance
1
Field programmable gate array
1
Field programmable gate arrays (FPGA)
1
Field programmables
1
Game theory
1
Geographical locations
1
Hardware security
1
Health care
1
Health-care system
1
-
241“...In general, conventional Arbiter-based Physically Unclonable Functions (PUFs) generate responses...”
Get full text
Article -
242“... in, e.g., stochastic computing, the generation of true random numbers, or physical unclonable functions...”
Get full text
Article -
243“... for HWBAN by using fewer Elliptic Curve Cryptography(ECC) operations and Physically Unclonable Function(PUF...”
Get full text
Article -
244by Lim, Daihyun, 1976-“... Unclonable Functions (PUFs) are proposed. This technique exploits statistical delay variation of wires...”
Published 2005
Get full text
Others -
245“...Physically unclonable function (PUF) and true random number generator (TRNG) are critical...”
Get full text
Article -
246
-
247“... authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable...”
Get full text
Article -
248“... various IoT entities. The devised protocol utilizes the physically unclonable function which helps...”
Get full text
Article -
249“... attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random...”
Get full text
Article -
250
-
251by Vivekraja, Vignesh“...-identifiers called Silicon Physical Unclonable Functions (PUFs) extract the random process characteristics...”
Published 2014
Get full text
Get full text
Others -
252“...Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong...”
Get full text
Article -
253“...Physical Unclonable Functions (PUFs) are used for authentication and generation of secure...”
Get full text
Article -
254“.... This generator, which was designed using chaotic systems, physical unclonable functions, and optimization...”
Get full text
Article -
255by Wojcik, Marcin“... of the thesis analyses properties of Physically Unclonable Functions (PUFs) and their applications. We examine...”
Published 2014
Get full text
-
256by Lin, Lang“... circuits with inherent physical randomness such as in the physical unclonable functions (PUFs). We have...”
Published 2012
Get full text
-
257Published 2017“... of these systems is a concern due to the sensitive data stored in them. The physically unclonable function (PUF...”
Get full text
Dissertation -
258by Wachsmann, Christian“... on Physically Unclonable Functions (PUFs). It presents advancements in the design, analysis and evaluation...”
Published 2014
Get full text
Get full text
Others -
259by Roberts, Jonny“...) and Physically Unclonable Functions (PUFs). The aim of the work in this thesis is to create a novel type of UNO...”
Published 2016
Get full text
-
260by Govindaraj, Rekha“... in the design of widely accepted hardware security primitives such as Physically Unclonable Function (PUF...”
Published 2018
Get full text
Get full text
Others