Results 41 to 50 of about 3,142 (227)

A formal definition and a new security mechanism of physical unclonable functions

open access: yes, 2012
The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms.
D. Lim   +5 more
core   +1 more source

Exploring Accelerated Aging Stress for Physical Unclonable Function Self-Corruption

open access: yesChips
Silicon-Based Physical Unclonable Functions (PUFs) exploit inherent manufacturing variations to produce a unique, random, and ideally unclonable secret key.
Eric Hunt-Schroeder, Tian Xia
doaj   +1 more source

A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks

open access: yesSensors, 2018
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open ...
Yuan Cao   +4 more
doaj   +1 more source

Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices

open access: yesSensors, 2022
Cybersecurity is a challenge in the utilization of IoT devices. One of the main security functions that we need for IoT devices is authentication. In this work, we used physical unclonable function (PUF) technology to propose a lightweight authentication
Armin Babaei   +2 more
doaj   +1 more source

Quantum cloning attacks against PUF-based quantum authentication systems

open access: yes, 2016
With the advent of Physical Unclonable Functions (PUFs), PUF-based quantum authentication systems (QAS) have been proposed for security purposes and recently proof-of-principle experiment has been demonstrated.
Gao, Ming, Li, Mo, Yao, Yao, Zhang, Jian
core   +1 more source

Q-Class Authentication System for Double Arbiter PUF [PDF]

open access: yes, 2018
Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property of each entity or Integrated Circuit (IC) chip. It is expected that PUF be used in security applications such as ID generation and authentication.
Kazuo SAKIYAMA   +3 more
core   +2 more sources

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

open access: yes, 2019
The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things.
Chesser, Michael   +5 more
core   +1 more source

Design Impedance Mismatch Physical Unclonable Functions for IoT Security

open access: yesActive and Passive Electronic Components, 2017
We propose a new design, Physical Unclonable Function (PUF) scheme, for the Internet of Things (IoT), which has been suffering from multiple-level security threats. As more and more objects interconnect on IoT networks, the identity of each thing is very
Xiaomin Zheng   +3 more
doaj   +1 more source

CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based Physical Unclonable Functions for Stable Key Generation [PDF]

open access: gold, 2023
Simon Böttger   +8 more
  +5 more sources

Sensitivity of the Threshold Current for Switching of a Magnetic Tunnel Junction to Fabrication Defects and Its Application in Physical Unclonable Functions

open access: yesApplied Sciences
A physical unclonable function (PUF) leverages the unclonable random variations in device behavior due to defects incurred during manufacturing to produce a unique “biometric” that can be used for authentication.
Jacob Huber   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy