A PUF-based cryptographic security solution for IoT systems on chip
暂无分享,去创建一个
Marcian Cirstea | Florin Sandu | Titus Balan | Alexandra Balan | M. Cirstea | T. Balan | F. Sandu | A. Balan
[1] Shreyas Sen,et al. RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[2] Simha Sethumadhavan,et al. Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property , 2013, IEEE Design & Test.
[3] Debdeep Mukhopadhyay,et al. A PUF-Based Secure Communication Protocol for IoT , 2017, IACR Cryptol. ePrint Arch..
[4] Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things , 2017, SpaCCS Workshops.
[5] An Braeken,et al. PUF Based Authentication Protocol for IoT , 2018, Symmetry.
[6] István Z. Kovács,et al. Coverage and Capacity Analysis of Sigfox, LoRa, GPRS, and NB-IoT , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[7] Seung-Hoon Hwang,et al. A survey on LPWA technology: LoRa and NB-IoT , 2017, ICT Express.
[8] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[9] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[10] Jean-Christophe Prévotet,et al. ARM-FPGA-based platform for reconfigurable wireless communication systems using partial reconfiguration , 2017, EURASIP J. Embed. Syst..
[11] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[12] Antonino Mazzeo,et al. Authenticating IoT Devices with Physically Unclonable Functions Models , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[13] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[14] Maurizio Murroni,et al. IoT architecture for multisensorial media , 2017, 2017 IEEE URUCON.
[15] Bernd Klauer,et al. Hardware Based Security Enhanced Direct Memory Access , 2013, Communications and Multimedia Security.
[16] Andrew Huang,et al. Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.
[17] M. Aman. Physical Unclonable Functions for IoT Security , 2016 .
[18] Marcian N. Cirstea,et al. Analysis and Evaluation of PUF-Based SoC Designs for Security Applications , 2016, IEEE Transactions on Industrial Electronics.
[19] Lilian Bossuet,et al. Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[20] JinYier,et al. Hardware Trojans in Wireless Cryptographic ICs , 2010 .
[21] Patrick Stewin,et al. Detecting peripheral-based attacks on the host memory , 2014 .
[22] Alec Wolman,et al. Protecting Data on Smartphones and Tablets from Memory Attacks , 2015, ASPLOS.
[23] Yiorgos Makris,et al. Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.