History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 38 total

Anti-counterfeiting with hardware intrinsic security. (English)
DATE, 1137-1142(2013)
WorldCat.org
1
Efficient implementation of true random number generator based on SRAM PUFs. (English)
Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 300-318 (2012).
WorldCat.org
2
Evaluation of 90nm 6T-SRAM as Physical Unclonable Function for secure key generation in wireless sensor nodes. (English)
ISCAS, 567-570(2011)
WorldCat.org
3
Hardware intrinsic security. (English)
Ors Yalcin, Siddika Berna (ed.), Radio frequency identification: Security and privacy issues. 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8‒9, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16821-5/pbk). Lecture Notes in Computer Science 6370, 123 (2010).
WorldCat.org
4
Key extraction from general nondiscrete signals. (English)
IEEE Transactions on Information Forensics and SecurityIEEE Transactions on Information Forensics and Security 5, N0. 2, 269-279(2010)
WorldCat.org
5
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. (English)
Towards Hardware-Intrinsic Security, 135-164(2010)
WorldCat.org
6
Memory leakage-resilient encryption based on physically unclonable functions. (English)
Matsui, Mitsuru (ed.), Advances in cryptology ‒ ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6‒10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 685-702 (2009).
WorldCat.org
7
Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. (English)
Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2009. 11th international workshop Lausanne, Switzerland, September 6‒9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 332-347 (2009).
WorldCat.org
8
Analysis and Design of Active IC Metering Schemes. (English)
HOST, 74-81(2009)
WorldCat.org
9
A soft decision helper data algorithm for SRAM PUFs. (English)
ISIT, 2101-2105(2009)
WorldCat.org
10
Privacy Weaknesses in Biometric Sketches. (English)
IEEE Symposium on Security and Privacy, 188-203(2009)
WorldCat.org
11
Reconfigurable Physical Unclonable Functions ‒ Enabling Technology for Tamper-Resistant Storage. (English)
HOST, 22-29(2009)
WorldCat.org
12
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. (English)
Inf. Syst. Front. 11, No. 1, 19-41 (2009).
WorldCat.org
13
Controlled physical random functions and applications. (English)
ACM Trans. Inf. Syst. Secur. 10, No. 4 (2008).
WorldCat.org
14
Embedded trusted computing with authenticated non-volatile memory. (English)
Lipp, Peter (ed.) et al., Trusted computing ‒ challenges and applications. First international conference on trusted computing and trust in information technologies, TRUST 2008, Villach, Austria, March 11‒12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68978-2/pbk). Lecture Notes in Computer Science 4968, 60-74 (2008).
WorldCat.org
15
Mutual information analysis. A generic side-channel distinguisher. (English)
Oswald, Elisabeth (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2008. 10th international workshop, Washington, D.C., USA, August 10‒13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85052-6/pbk). Lecture Notes in Computer Science 5154, 426-442 (2008).
WorldCat.org
16
Efficient helper data key extractor on FPGAs. (English)
Oswald, Elisabeth (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2008. 10th international workshop, Washington, D.C., USA, August 10‒13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85052-6/pbk). Lecture Notes in Computer Science 5154, 181-197 (2008).
WorldCat.org
17
The Butterfly PUF: Protecting IP on every FPGA. (English)
HOST, 67-70(2008)
WorldCat.org
18
FPGA intrinsic PUFs and their use for IP protection. (English)
Paillier, Pascal (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2007. 9th international workshop, Vienna, Austria, September 10‒13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74734-5/pbk). Lecture Notes in Computer Science 4727, 63-80 (2007).
WorldCat.org
19
Security with noisy data. Private biometrics, secure storage and anti-counterfeiting. (English)
London: Springer (ISBN 978-1-84628-983-5/hbk). xv, 339~p. EUR~82.34 (2007).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 38 total

Valid XHTML 1.0 Transitional Valid CSS!