A survey on blockchain interoperability: Past, present, and future trends
Blockchain interoperability is emerging as one of the crucial features of blockchain
technology, but the knowledge necessary for achieving it is fragmented. This fact makes it …
technology, but the knowledge necessary for achieving it is fragmented. This fact makes it …
Advances in logic locking: Past, present, and prospects
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
Toward human-centric smart manufacturing: A human-cyber-physical systems (HCPS) perspective
Advances in human-centric smart manufacturing (HSM) reflect a trend towards the
integration of human-in-the-loop with technologies, to address challenges of human …
integration of human-in-the-loop with technologies, to address challenges of human …
Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions
Abstract The Internet of Things (IoTs) enables coupling of digital and physical objects using
worthy communication technologies and introduces a future vision where computing …
worthy communication technologies and introduces a future vision where computing …
Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities
The ubiquitous use of Internet of Things (IoT) ranges from industrial control systems to e-
Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber …
Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber …
Provably-secure logic locking: From theory to practice
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
Physical unclonable functions
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
On improving the security of logic locking
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …