Results 101 to 110 of about 137,811 (163)
Energy-Efficient and Attacks Resilient PUF Design Exploiting VGSOT-MTJ
Spintronic Physically Unclonable Functions (PUFs) show promise in enhancing electronic system security due to their inherent randomness, low energy consumption, fast response times, and temperature stability.
Kunal Kranti Das +3 more
doaj +1 more source
Concealable physical unclonable functions using vertical NAND flash memory
Physical Unclonable Functions (PUFs) can address the demand for enhanced hardware security. Vertical NAND (V-NAND) flash memory is the most commercialized non-volatile memory.
Sung-Ho Park +5 more
doaj +1 more source
Citation: 'puffing inhibitor' in the IUPAC Compendium of Chemical Terminology, 3rd ed.; International Union of Pure and Applied Chemistry; 2006. Online version 3.0.1, 2019. 10.1351/goldbook.P04942 • License: The IUPAC Gold Book is licensed under Creative Commons Attribution-ShareAlike CC BY-SA 4.0 International for individual terms.
openaire +1 more source
Background Diffuse large B-cell lymphoma (DLBCL) remains a therapeutic challenge, with a substantial proportion of patients failing to respond to standard regimens.
Chang Su +9 more
doaj +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ACM Journal on Emerging Technologies in Computing Systems, 2016
In this work, we have studied two novel techniques to enhance the performance of existing geometry-based magnetoresistive RAM physically unclonable function (MRAM PUF). Geometry-based MRAM PUFs rely only on geometric variations in MRAM cells that generate preferred ground state in cells and form the basis of digital signature generation.
Jayita Das, Kevin Scott, Sanjukta Bhanja
openaire +1 more source
In this work, we have studied two novel techniques to enhance the performance of existing geometry-based magnetoresistive RAM physically unclonable function (MRAM PUF). Geometry-based MRAM PUFs rely only on geometric variations in MRAM cells that generate preferred ground state in cells and form the basis of digital signature generation.
Jayita Das, Kevin Scott, Sanjukta Bhanja
openaire +1 more source
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Cryptographers have proposed the notion of read-once keys (ROKs) as a beneficial tool for a number of applications, such as delegation of authority. The premise of ROKs is that the key is destroyed by the process of reading it, thus preventing subsequent accesses.
Kirkpatrick, Michael +2 more
openaire +2 more sources
Cryptographers have proposed the notion of read-once keys (ROKs) as a beneficial tool for a number of applications, such as delegation of authority. The premise of ROKs is that the key is destroyed by the process of reading it, thus preventing subsequent accesses.
Kirkpatrick, Michael +2 more
openaire +2 more sources
Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems, 2016
Physically Unclonable Functions (PUFs) have proved to be an effective and low-cost measure against counterfeiting by providing device authentication and secure key storage services. Memory based PUF implementations are an attractive option due to the ubiquitous nature of memory in electronic devices and the requirement of minimal (or no) additional ...
Soubhagya Sutar +2 more
openaire +1 more source
Physically Unclonable Functions (PUFs) have proved to be an effective and low-cost measure against counterfeiting by providing device authentication and secure key storage services. Memory based PUF implementations are an attractive option due to the ubiquitous nature of memory in electronic devices and the requirement of minimal (or no) additional ...
Soubhagya Sutar +2 more
openaire +1 more source

