Results 61 to 70 of about 2,945 (188)
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
We use commercial magnetic memory to realize morphable security primitives, a Physically Unclonable Function (PUF) and a True Random Number Generator (TRNG).
Mohammad Nasim Imtiaz Khan +4 more
doaj +1 more source
Fine Optimization of Colloidal Photonic Crystal Structural Color for Physically Unclonable Multiplex Encryption and Anti-Counterfeiting. [PDF]
Gao Y +7 more
europepmc +2 more sources
Non‐Uniform Programmable Photonic Waveguide Meshes
Integrating defect cells into uniform hexagonal waveguide meshes overcomes the fundamental spectral and temporal limitations of programmable photonics. By leveraging the Vernier effect through non‐uniform coupled cavities, this architecture achieves a tenfold increase in free spectral range and ultra‐fast sampling times, paving the way for next ...
Cristina Catalá‐Lahoz, José Capmany
wiley +1 more source
Modeling attacks on physical unclonable functions [PDF]
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs.
Ulrich, Ruhrmair +5 more
openaire +4 more sources
The increasing threat of security attacks on hardware security applications has driven research towards exploring beyond CMOS devices as an alternative.
Divyanshu Divyanshu +4 more
doaj +1 more source
This study presents a dynamic interaction between liquid resins and photopolymerized structures enabled by an in situ light‐writing setup. By controlling a three‐phase interface through localized photopolymerization, which provides physical confinement for the remaining uncured resin regions, the approach establishes a programmable pathway that ...
Kibeom Kim +3 more
wiley +1 more source
Since the discovery of the physical random functions and their subsequent refinement into physical unclonable functions (PUF), a great effort has been made in developing and characterizing these objects attending to their physical properties as well as ...
Guillermo Diez-Senorans +3 more
doaj +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
A Reliable Low-area Low-power PUF-based Key Generator [PDF]
This paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell.
Bucci, Marco +3 more
core

