[HTML][HTML] A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks
Abstract As the Intenert of Things (IoT) continues to evolve in our daily personal lives and in
future industrial systems (industry 4.0), one of the most significant issues is security. IoT …
future industrial systems (industry 4.0), one of the most significant issues is security. IoT …
PUFs at a glance
U Rührmair, DE Holcomb - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which
has been introduced just about a decade ago. In this paper, we provide a brief and easily …
has been introduced just about a decade ago. In this paper, we provide a brief and easily …
Ultra-compact and robust physically unclonable function based on voltage-compensated proportional-to-absolute-temperature voltage generators
This paper presents a technique for designing an ultra-compact and robust physically
unclonable function for security-oriented applications. The circuits are based on pairs of …
unclonable function for security-oriented applications. The circuits are based on pairs of …
Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2
A Alharbi, D Armstrong, S Alharbi, D Shahrjerdi - ACS nano, 2017 - ACS Publications
Physically unclonable cryptographic primitives are promising for securing the rapidly
growing number of electronic devices. Here, we introduce physically unclonable primitives …
growing number of electronic devices. Here, we introduce physically unclonable primitives …
PUF modeling attacks: An introduction and overview
U Rührmair, J Sölter - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Machine learning (ML) based modeling attacks are the currently most relevant and effective
attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide …
attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide …
[HTML][HTML] The use of iot-based wearable devices to ensure secure lightweight payments in fintech applications
S Bojjagani, NR Seelam, NK Sharma, R Uyyala… - Journal of King Saud …, 2023 - Elsevier
Daily digital payments in Financial Technology (FinTech) are growing exponentially. A huge
demand is for developing secure, lightweight cryptography protocols for wearable IoT-based …
demand is for developing secure, lightweight cryptography protocols for wearable IoT-based …
[HTML][HTML] Photonic side-channel analysis of arbiter PUFs
S Tajik, E Dietz, S Frohmann, H Dittrich… - Journal of …, 2017 - Springer
As intended by its name, physically unclonable functions (PUFs) are considered as an
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …
The case for blockchain in IoT identity management
Purpose The aim of this paper is to evaluate the use of blockchain for identity management
(IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving …
(IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving …
Current mirror array: A novel circuit topology for combining physical unclonable function and machine learning
Edge analytics support industrial Internet of Things by pushing some data processing
capacity to the edge of the network instead of sending the streaming data captured by the …
capacity to the edge of the network instead of sending the streaming data captured by the …