Results 61 to 70 of about 2,945 (188)

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

A Morphable Physically Unclonable Function and True Random Number Generator Using a Commercial Magnetic Memory

open access: yesJournal of Low Power Electronics and Applications, 2021
We use commercial magnetic memory to realize morphable security primitives, a Physically Unclonable Function (PUF) and a True Random Number Generator (TRNG).
Mohammad Nasim Imtiaz Khan   +4 more
doaj   +1 more source

Non‐Uniform Programmable Photonic Waveguide Meshes

open access: yesLaser &Photonics Reviews, EarlyView.
Integrating defect cells into uniform hexagonal waveguide meshes overcomes the fundamental spectral and temporal limitations of programmable photonics. By leveraging the Vernier effect through non‐uniform coupled cavities, this architecture achieves a tenfold increase in free spectral range and ultra‐fast sampling times, paving the way for next ...
Cristina Catalá‐Lahoz, José Capmany
wiley   +1 more source

Modeling attacks on physical unclonable functions [PDF]

open access: yesProceedings of the 17th ACM conference on Computer and communications security, 2010
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs.
Ulrich, Ruhrmair   +5 more
openaire   +4 more sources

Physically Unclonable Function Using GSHE Driven SOT Assisted p-MTJ for Next Generation Hardware Security Applications

open access: yesIEEE Access, 2022
The increasing threat of security attacks on hardware security applications has driven research towards exploring beyond CMOS devices as an alternative.
Divyanshu Divyanshu   +4 more
doaj   +1 more source

Programmable In‐Situ Interactions Between Resins and Photopolymerized Structures for Seamlessly Integrated Optical Manufacturing of Microlenses

open access: yesAdvanced Functional Materials, Volume 36, Issue 28, 7 April 2026.
This study presents a dynamic interaction between liquid resins and photopolymerized structures enabled by an in situ light‐writing setup. By controlling a three‐phase interface through localized photopolymerization, which provides physical confinement for the remaining uncured resin regions, the approach establishes a programmable pathway that ...
Kibeom Kim   +3 more
wiley   +1 more source

Digitization Algorithms in Ring Oscillator Physically Unclonable Functions as a Main Factor Achieving Hardware Security

open access: yesIEEE Access, 2021
Since the discovery of the physical random functions and their subsequent refinement into physical unclonable functions (PUF), a great effort has been made in developing and characterizing these objects attending to their physical properties as well as ...
Guillermo Diez-Senorans   +3 more
doaj   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

A Reliable Low-area Low-power PUF-based Key Generator [PDF]

open access: yes, 2016
This paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell.
Bucci, Marco   +3 more
core  

Home - About - Disclaimer - Privacy