We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 386 results
  1. A Physically Unclonable Function for Biomedical Devices Authentication

    Security and authentication of low-power embedded systems for the internet of things (IoT) is a research topic that is growing due to the extensive...
    João Cabacinho, João Casaleiro, Luís B. Oliveira in Technological Innovation for Human-Centric Systems
    Conference paper 2024
  2. Error reduction of SRAM-based physically unclonable function for chip authentication

    SRAM-based physically unclonable function (PUF) is an attractive security primitive for cryptographic protocol and security architecture because SRAM...

    Moon-Seok Kim, Sungho Kim, ... Yang-Kyu Choi in International Journal of Information Security
    Article 20 February 2023
  3. A strong physical unclonable function with machine learning immunity for Internet of Things application

    The physical unclonable functions (PUFs) are novel cryptographic primitives in modern hardware security systems. Compared with traditional...

    Pengpeng Ren, Yongkang Xue, ... Zhigang Ji in Science China Information Sciences
    Article 18 December 2023
  4. A password less authentication protocol for multi-server environment using physical unclonable function

    Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...

    E. Praveen Kumar, S. Priyanka in The Journal of Supercomputing
    Article 21 June 2023
  5. Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function

    Internet of things (IoT) systems consist of many devices that send their sensor data to cloud servers. Cryptographic authentication is essential for...
    Yuichi Komano, Mitsugu Iwamoto, ... Kazuo Sakiyama in Innovative Security Solutions for Information Technology and Communications
    Conference paper 2023
  6. A Mini Review on—Physically Unclonable Functions: The Hardware Security Primitives

    The Internet of Things (IoTs) is made up of several interconnected, resource-constrained devices, including sensors, actuators, and nodes that are...
    Harsh Panchal, Naveen Kumar Chaudhary, Sandeep Munjal in Information Security, Privacy and Digital Forensics
    Conference paper 2024
  7. Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems

    In this rapidly advancing era, technology has been progressing extensively and swiftly. As a result, the emergence of numerous Cyber-Physical Systems...

    Hind A. Al-Ghuraybi, Mohammed A. AlZain, Ben Soh in Multimedia Tools and Applications
    Article 29 September 2023
  8. An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function

    Nowadays, smart card and password-based user authentication and key agreement schemes have become an integral mechanism to ensure only legitimate...

    Gaurav Tyagi, Rahul Kumar in International Journal of Information Security
    Article 02 November 2023
  9. Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions

    In the realm of IoT and blockchain, security and privacy are paramount. This paper explores the fusion of Zero-Knowledge Succinct Non-Interactive...
    Pranav Unni, Saumya Banerjee, Samia Bouzefrane in Information Security Theory and Practice
    Conference paper 2024
  10. FPGA Implementation of Physically Unclonable Functions Based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks

    Physically Unclonable Functions (PUFs) are security primitives that generate chip-specific responses by exploiting the subtle manufacturing...
    Tatsuya Oyama, Mika Sakai, ... Takeshi Fu**o in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  11. A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model

    Analysis of advanced physical unclonable function (PUF) applications and protocols relies on assuming that a PUF behaves like a random oracle; that...

    Marten van Dijk, Chenglu ** in Journal of Cryptology
    Article Open access 03 August 2023
  12. A service-categorized security scheme with physical unclonable functions for internet of vehicles

    In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside....

    Nadhir Ben Halima, Ala Saleh Alluhaidan, ... Mohammad Ayoub Khan in Journal of Big Data
    Article Open access 21 December 2023
  13. A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments

    With the growth of networks and semi-conduction, the Internet of things (IoT) is undergoing a golden year nowadays. At the same time, the Internet of...
    Bo-An Lai, Yi-Hsiu Yeh, ... Nai-Wei Lo in New Trends in Computer Technologies and Applications
    Conference paper 2022
  14. Physically Unclonable Functions and AI

    The current chapter aims at establishing a relationship between artificial intelligence (AI) and hardware security. Such a connection between AI and...
    Fatemeh Ganji, Shahin Tajik in Security and Artificial Intelligence
    Chapter 2022
  15. PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

    Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...

    Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel in Cluster Computing
    Article 06 April 2024
  16. A New Efficient PUF-Based Mutual Authentication Scheme for Drones

    This paper proposes a new lightweight mutual authentication scheme for drones that is based on a Physical Unclonable Function (PUF) which uses...
    Edoukou Berenger Ayebie, Karam Bou-chaaya, Helmi Rais in Risks and Security of Internet and Systems
    Conference paper 2024
  17. Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints

    Uniqueness and Uniformity are two important quality metrics that determine the practical usability of a strong Physically Unclonable Function...
    Venkata Sreekanth Balijabudda, Kamalesh Acharya, ... Indrajit Chakrabarti in Information Systems Security
    Conference paper 2023
  18. A new read–write collision-based SRAM PUF implemented on **linx FPGAs

    Physically unclonable functions (PUFs) are device-specific digital fingerprints derived from physical properties. They are used in critical...

    Ihsan Cicek, Ahmad Al Khas in Journal of Cryptographic Engineering
    Article 29 January 2022
  19. Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”

    The advent of the Internet of Things has enriched the network field with new themes, among which we find the Internet of Vehicles (IoV). IoV improved...

    Ilyes Ahmim, Nacira Ghoualmi-Zine, ... Marwa Ahmim in International Journal of Information Security
    Article 07 May 2022
Did you find what you were looking for? Share feedback.