A survey on blockchain interoperability: Past, present, and future trends

R Belchior, A Vasconcelos, S Guerreiro… - Acm Computing Surveys …, 2021 - dl.acm.org
Blockchain interoperability is emerging as one of the crucial features of blockchain
technology, but the knowledge necessary for achieving it is fragmented. This fact makes it …

Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Toward human-centric smart manufacturing: A human-cyber-physical systems (HCPS) perspective

B Wang, P Zheng, Y Yin, A Shih, L Wang - Journal of Manufacturing …, 2022 - Elsevier
Advances in human-centric smart manufacturing (HSM) reflect a trend towards the
integration of human-in-the-loop with technologies, to address challenges of human …

Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

B Bhushan, C Sahoo, P Sinha, A Khamparia - Wireless Networks, 2021 - Springer
Abstract The Internet of Things (IoTs) enables coupling of digital and physical objects using
worthy communication technologies and introduces a future vision where computing …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities

I Makhdoom, I Zhou, M Abolhasan, J Lipman, W Ni - Computers & Security, 2020 - Elsevier
The ubiquitous use of Internet of Things (IoT) ranges from industrial control systems to e-
Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber …

Provably-secure logic locking: From theory to practice

M Yasin, A Sengupta, MT Nabeel, M Ashraf… - Proceedings of the …, 2017 - dl.acm.org
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …

A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Physical unclonable functions

Y Gao, SF Al-Sarawi, D Abbott - Nature Electronics, 2020 - nature.com
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …

On improving the security of logic locking

M Yasin, JJV Rajendran, O Sinanoglu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …