Search
Search Results
-
-
A Physically Unclonable Function for Biomedical Devices Authentication
Security and authentication of low-power embedded systems for the internet of things (IoT) is a research topic that is growing due to the extensive... -
Error reduction of SRAM-based physically unclonable function for chip authentication
SRAM-based physically unclonable function (PUF) is an attractive security primitive for cryptographic protocol and security architecture because SRAM...
-
A strong physical unclonable function with machine learning immunity for Internet of Things application
The physical unclonable functions (PUFs) are novel cryptographic primitives in modern hardware security systems. Compared with traditional...
-
A password less authentication protocol for multi-server environment using physical unclonable function
Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...
-
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function
Internet of things (IoT) systems consist of many devices that send their sensor data to cloud servers. Cryptographic authentication is essential for... -
A Mini Review on—Physically Unclonable Functions: The Hardware Security Primitives
The Internet of Things (IoTs) is made up of several interconnected, resource-constrained devices, including sensors, actuators, and nodes that are... -
Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems
In this rapidly advancing era, technology has been progressing extensively and swiftly. As a result, the emergence of numerous Cyber-Physical Systems...
-
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function
Nowadays, smart card and password-based user authentication and key agreement schemes have become an integral mechanism to ensure only legitimate...
-
Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions
In the realm of IoT and blockchain, security and privacy are paramount. This paper explores the fusion of Zero-Knowledge Succinct Non-Interactive... -
FPGA Implementation of Physically Unclonable Functions Based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks
Physically Unclonable Functions (PUFs) are security primitives that generate chip-specific responses by exploiting the subtle manufacturing... -
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model
Analysis of advanced physical unclonable function (PUF) applications and protocols relies on assuming that a PUF behaves like a random oracle; that...
-
A service-categorized security scheme with physical unclonable functions for internet of vehicles
In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside....
-
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments
With the growth of networks and semi-conduction, the Internet of things (IoT) is undergoing a golden year nowadays. At the same time, the Internet of... -
Physically Unclonable Functions and AI
The current chapter aims at establishing a relationship between artificial intelligence (AI) and hardware security. Such a connection between AI and... -
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...
-
A New Efficient PUF-Based Mutual Authentication Scheme for Drones
This paper proposes a new lightweight mutual authentication scheme for drones that is based on a Physical Unclonable Function (PUF) which uses... -
Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints
Uniqueness and Uniformity are two important quality metrics that determine the practical usability of a strong Physically Unclonable Function... -
A new read–write collision-based SRAM PUF implemented on **linx FPGAs
Physically unclonable functions (PUFs) are device-specific digital fingerprints derived from physical properties. They are used in critical...
-
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”
The advent of the Internet of Things has enriched the network field with new themes, among which we find the Internet of Vehicles (IoV). IoV improved...