Showing 41 - 60 results of 274 for search '"Physical Unclonable Function"', query time: 4.23s Refine Results
  1. 41
  2. 42
  3. 43
    by Ganta, Dinesh
    Published 2015
    Subjects: ...Physical Unclonable Functions...
    Get full text
    Others
  4. 44
    ...Abstract Nowadays, physical unclonable functions (PUFs) are emerging as one of the key building...
    Get full text
    Article
  5. 45
    by Vincent Immler, Karthik Uppund
    Published 2019-05-01
    Subjects: ...Physical Unclonable Function (PUF)...
    Get full text
    Article
  6. 46
  7. 47
  8. 48
    by Armin Babaei, Gregor Schiele
    Published 2019-07-01
    ...Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions (PUFs...
    Get full text
    Article
  9. 49
    Published 2017
    Subjects: ...Physical Unclonable Function...
    Get full text
    Dissertation
  10. 50
    ...Abstract Quantum dot physically unclonable functions (QD-PUFs) provide a promising solution...
    Get full text
    Article
  11. 51
    by Challa, Rohith Prasad
    Published 2018
    ...Physically Unclonable Functions (PUFs) are now widely being used to uniquely identify Integrated...
    Get full text
    Get full text
    Others
  12. 52
    by Azhar, Mahmood Javed
    Published 2018
    ..., and Physical unclonable functions for hardware security applications. Ring oscillator circuits...
    Get full text
    Get full text
    Others
  13. 53
  14. 54
  15. 55
  16. 56
    by Mingyang Gong, Hailong Liu, Run Min, Zhenglin Liu
    Published 2018-06-01
    ...Static Random Access Memory (SRAM) Physical Unclonable Functions (PUFs) are some of the most...
    Get full text
    Article
  17. 57
    ...Paral and Devadas introduced a simple key generation scheme with a physically unclonable function...
    Get full text
    Article
  18. 58
    ...The paper analyzes and proposes some enhancements of Ring-Oscillators-based Physical Unclonable...
    Get full text
    Article
  19. 59
  20. 60
    ...Physical unclonable function (PUF) has emerged as a promising and important security primitive...
    Get full text
    Article