Results 131 to 140 of about 2,983 (191)
Dickson polynomial-based secure group authentication scheme for Internet of Things. [PDF]
Syed SA +6 more
europepmc +1 more source
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks. [PDF]
Su X, Xu Y.
europepmc +1 more source
Physical unclonable in-memory computing for simultaneous protecting private data and deep learning models. [PDF]
Yue W +16 more
europepmc +1 more source
A memristor-based unified PUF and TRNG chip with a concealable ability for advanced edge security. [PDF]
Li X +9 more
europepmc +1 more source
Chemical unclonable functions based on operable random DNA pools. [PDF]
Luescher AM +4 more
europepmc +1 more source
Vehicular Sensing for Improved Urban Mobility. [PDF]
Caruntu CF, Comsa CR.
europepmc +1 more source
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones. [PDF]
Li Z, Ju Z, Zhao H, Wei Z, Lan G.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 3rd international workshop on Trustworthy embedded devices, 2013
The concept of the Physical Unclonable Function (PUF) is exhaustively characerised as an information storage device with a security mechanism that shall impede the duplication of its specified functionality and that is indivisible from its storage mechanism.
Dominik Merli, Rainer Plaga
openaire +2 more sources
The concept of the Physical Unclonable Function (PUF) is exhaustively characerised as an information storage device with a security mechanism that shall impede the duplication of its specified functionality and that is indivisible from its storage mechanism.
Dominik Merli, Rainer Plaga
openaire +2 more sources

