Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Using encryption for authentication in large networks of computers
Communications of the ACM
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
Towards Robust Low Cost Authentication for Pervasive Devices
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
IEEE Transactions on Computers
Robust Authentication Using Physically Unclonable Functions
ISC '09 Proceedings of the 12th International Conference on Information Security
Circuit-level techniques for reliable Physically Uncloneable Functions
HST '09 Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
Low-power sub-threshold design of secure physical unclonable functions
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
Modeling attacks on physical unclonable functions
Proceedings of the 17th ACM conference on Computer and communications security
PEAR: a hardware based protocol authentication system
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
SIMPL systems, or: can we design cryptographic hardware without secret key information?
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
Extracting secret keys from integrated circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Physically unclonable functions: manufacturing variability as an unclonable device identifier
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Information-theoretic security analysis of physical uncloneable functions
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Robust key extraction from physical uncloneable functions
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |