On the security of remote key less entry for vehicles
With the rapid growth in the automobile industry and the advancement in the embedded
technology, the traditional mechanical key for operating vehicles is gradually replaced by …
technology, the traditional mechanical key for operating vehicles is gradually replaced by …
[HTML][HTML] Investigation of the optimal method for generating and verifying the smartphone's fingerprint: a review
SJ Alsunaidi, AM Almuhaideb - Journal of King Saud University-Computer …, 2022 - Elsevier
The technical transformation and transfer of most services to digital platforms require that
everyone has an electronic device connected to the Internet to assist them accomplish their …
everyone has an electronic device connected to the Internet to assist them accomplish their …
Accelerometer-based joint user-device clone-resistant identity
Unclonable identity, Security, and privacy issues are becoming fundamental requirements
for most smart application environment. Recently, several state-of-the-art approaches have …
for most smart application environment. Recently, several state-of-the-art approaches have …
Defense against chip cloning attacks based on fractional Hopfield neural networks
YF Pu, Z Yi, JL Zhou - International Journal of Neural Systems, 2017 - World Scientific
This paper presents a state-of-the-art application of fractional hopfield neural networks
(FHNNs) to defend against chip cloning attacks, and provides insight into the reason that the …
(FHNNs) to defend against chip cloning attacks, and provides insight into the reason that the …
Secured remote sensing by deploying clone-resistant Secret Unknown Ciphers
Secured remote sensing is becoming a widely required technology to make certified
measurements at remote sites via Internet of Things (IoT) without the need for trusted …
measurements at remote sites via Internet of Things (IoT) without the need for trusted …
Clone-resistant vehicular RKE by deploying SUC
Many automotive Remote Keyless Entry (RKE) systems have been successfully attacked in
the last few years. The security of RKE systems is still a sensitive and crucial issue for …
the last few years. The security of RKE systems is still a sensitive and crucial issue for …
IP-core protection for a non-volatile Self-reconfiguring SoC environment
W Adi, S Zeitouni, X Huang, M Fyrbiak… - 2013 IFIP/IEEE 21st …, 2013 - ieeexplore.ieee.org
Non-volatile Self-reconfiguring VLSI units with System-on-Chip (SoC) architecture are
emerging as solutions for many modern applications. In this work, we propose a man …
emerging as solutions for many modern applications. In this work, we propose a man …
Security and Complexity Bounds of SUC-Based Physical Identity
Secret Unknown Ciphers (SUCs) were proposed recently as promising alternative physical
security anchors to counteract weaknesses of the traditional analog Physical Unclonable …
security anchors to counteract weaknesses of the traditional analog Physical Unclonable …
A New Low-Complexity Cipher Class for Clone-Resistant Identities
A new large cipher class based on new two variable self-inverse-permutation deploying
Golden S-Boxes is presented. The mapping has particular properties, in that it is both self …
Golden S-Boxes is presented. The mapping has particular properties, in that it is both self …
Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices
Physical Unclonable Functions PUFs were proposed about two decades ago for creating
physically unclonable VLSI units. PUFs as analog structures, are inherently rather costly in …
physically unclonable VLSI units. PUFs as analog structures, are inherently rather costly in …