Results 91 to 100 of about 4,625 (193)

The entropy of keys derived from laser speckle

open access: yes, 2007
Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication,
Skoric, B.
core   +1 more source

Privacy-Preserving Authentication Based on PUF for VANETs

open access: yesFuture Internet
The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks.
Lihui Li   +3 more
doaj   +1 more source

Sensitivity of the Threshold Current for Switching of a Magnetic Tunnel Junction to Fabrication Defects and Its Application in Physical Unclonable Functions

open access: yesApplied Sciences
A physical unclonable function (PUF) leverages the unclonable random variations in device behavior due to defects incurred during manufacturing to produce a unique “biometric” that can be used for authentication.
Jacob Huber   +2 more
doaj   +1 more source

Symmetric physically unclonable functions of the arbiter type

open access: yesInformatika
Objectives. The problem of constructing a new class of physically unclonable functions of the arbiter type (APUF) that combines the advantages of both classical and balanced APUF is solved.
V. N. Yarmolik, A. A. Ivaniuk
doaj   +1 more source

Analysis of Physical Unclonable Functions Based on Memory

open access: yesБезопасность информационных технологий, 2015
The article discusses the constructions of physical unclonable functions (PUF) based on memory. The analysis of different constructions and conclusion is given.
Semen Valerievich Sukhanov
doaj  

A Door Lock Security System with Remote Keyless Feature Using The Puf Approach Method

open access: yesCHIPSET
Home security systems are now increasingly important to provide peace and comfort, Especially if the occupants often leave the house. As the main access point, the door is an important thing to pay attention to in maintaining home security.
Muhamad Noveri Ramadhan, Dodon Yendri
doaj   +1 more source

Asynchronous Physical Unclonable Functions – AsyncPUF [PDF]

open access: yes, 2012
Physically Unclonable Functions (PUFs) exploit the physical characteristics of silicon and provide an alternative to storing digital encryption keys in non-volatile memory. A PUF maps a unique set of digital inputs to a corresponding set of digital outputs.
openaire   +1 more source

Home - About - Disclaimer - Privacy