Digital fingerprints for low-cost platforms using MEMS sensors
暂无分享,去创建一个
Nahid Farhady Ghalaty | Patrick Schaumont | Aydin Aysu | Zane R. Franklin | Moein Pahlavan Yali | N. F. Ghalaty | P. Schaumont | Aydin Aysu | M. Yali
[1] R. Nance,et al. Role of Boundary Conditions in Monte Carlo Simulation of Microelectromechanical Systems , 1998 .
[2] D. S. Eddy,et al. Application of MEMS technology in automotive sensors and actuators , 1998 .
[3] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[4] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[5] Jason V. Clark,et al. Practical Techniques for Measuring MEMS Properties , 2004 .
[6] A. Mawardi,et al. Design of microresonators under uncertainty , 2005, Journal of Microelectromechanical Systems.
[7] Joshua R. Smith,et al. Battery-free wireless identification and sensing , 2005, IEEE Pervasive Computing.
[8] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[9] Jiming Chen,et al. RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations , 2009 .
[10] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[11] Patrick Schaumont,et al. A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[12] David Naccache,et al. Towards Hardware-Intrinsic Security - Foundations and Practice , 2010, Information Security and Cryptography.
[13] Ramesh Karri,et al. Sensor physical unclonable functions , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[14] Aikaterini Mitrokotsa,et al. Integrated RFID and Sensor Networks: Architectures and Applications , 2010 .
[15] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[16] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[17] Tim Güneysu,et al. Using Data Contention in Dual-ported Memories for Security Applications , 2010, Journal of Signal Processing Systems.
[18] Patrick Schaumont,et al. A novel microprocessor-intrinsic Physical Unclonable Function , 2012, 22nd International Conference on Field Programmable Logic and Applications (FPL).