Results 91 to 100 of about 4,625 (193)
The entropy of keys derived from laser speckle
Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication,
Skoric, B.
core +1 more source
Privacy-Preserving Authentication Based on PUF for VANETs
The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks.
Lihui Li +3 more
doaj +1 more source
Entropy Sources Based on Silicon Chips: True Random Number Generator and Physical Unclonable Function. [PDF]
Cao Y +7 more
europepmc +1 more source
iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function. [PDF]
Park K, Park Y.
europepmc +1 more source
Physical Unclonable Function Based on the Internal State Transitions of a Fibonacci Ring Oscillator. [PDF]
Matuszewski Ł +3 more
europepmc +1 more source
A physical unclonable function (PUF) leverages the unclonable random variations in device behavior due to defects incurred during manufacturing to produce a unique “biometric” that can be used for authentication.
Jacob Huber +2 more
doaj +1 more source
Symmetric physically unclonable functions of the arbiter type
Objectives. The problem of constructing a new class of physically unclonable functions of the arbiter type (APUF) that combines the advantages of both classical and balanced APUF is solved.
V. N. Yarmolik, A. A. Ivaniuk
doaj +1 more source
Analysis of Physical Unclonable Functions Based on Memory
The article discusses the constructions of physical unclonable functions (PUF) based on memory. The analysis of different constructions and conclusion is given.
Semen Valerievich Sukhanov
doaj
A Door Lock Security System with Remote Keyless Feature Using The Puf Approach Method
Home security systems are now increasingly important to provide peace and comfort, Especially if the occupants often leave the house. As the main access point, the door is an important thing to pay attention to in maintaining home security.
Muhamad Noveri Ramadhan, Dodon Yendri
doaj +1 more source
Asynchronous Physical Unclonable Functions – AsyncPUF [PDF]
Physically Unclonable Functions (PUFs) exploit the physical characteristics of silicon and provide an alternative to storing digital encryption keys in non-volatile memory. A PUF maps a unique set of digital inputs to a corresponding set of digital outputs.
openaire +1 more source

