Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
暂无分享,去创建一个
Laurent Njilla | Saloni Jain | Bertrand Cambou | Laurent L. Njilla | Michael Gowanlock | Duane Booher | Donald Telesca | Christopher Philabaum | Ian Burke | Julie Heynssens | Jack Garrard | B. Cambou | M. Gowanlock | L. Njilla | D. Telesca | J. Heynssens | C. Philabaum | Ian Burke | Saloni Jain | D. Booher | Jack Garrard
[1] E. O. Kiktenko,et al. Quantum-secured blockchain , 2017, Quantum Science and Technology.
[2] Yier Jin,et al. Introduction to Hardware Security , 2015, Electronics.
[3] Bin Chen,et al. A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[4] Tera Introduction to Post-Quantum Cryptography in scope of NIST ' s Post-Quantum Competition , 2019 .
[5] Si Chen,et al. A Blockchain-Based Supply Chain Quality Management Framework , 2017, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).
[6] Daniel Apon,et al. Status report on the first round of the NIST post-quantum cryptography standardization process , 2019 .
[7] Fei Tao,et al. Blockchain-Based Trust Mechanism for IoT-Based Smart Manufacturing System , 2019, IEEE Transactions on Computational Social Systems.
[8] George Suciu,et al. Comparative Analysis of Distributed Ledger Technologies , 2018, 2018 Global Wireless Summit (GWS).
[9] An Chen,et al. Comprehensive assessment of RRAM-based PUF for hardware security applications , 2015, 2015 IEEE International Electron Devices Meeting (IEDM).
[10] Arnab Banerjee,et al. Chapter Three - Blockchain Technology: Supply Chain Insights from ERP , 2018, Adv. Comput..
[11] Ravikiran Vatrapu,et al. Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning , 2018, HICSS.
[12] Josip Stjepandic,et al. Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology , 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).
[13] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[14] Takeshi Fujino,et al. A stable key generation from PUF responses with a Fuzzy Extractor for cryptographic authentications , 2013, 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE).
[15] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[16] Jennifer Xu,et al. Are blockchains immune to all malicious attacks? , 2016 .
[17] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[19] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[20] Paul G. Flikkema,et al. Can Ternary Computing Improve Information Assurance? , 2018, Cryptogr..
[21] Axel Küpper,et al. Blockchain-Based Supply Chain Traceability: Token Recipes Model Manufacturing Processes , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[22] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[23] Yohei Hori,et al. Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.
[24] Zhenfei Zhang,et al. Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU , 2019 .
[25] Sachin Shetty,et al. Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[26] Alfred Menezes,et al. A Riddle Wrapped in an Enigma , 2016, IEEE Security & Privacy.
[27] Tim Güneysu,et al. Security analysis of index-based syndrome coding for PUF-based key generation , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[28] Bradford Nichols,et al. Pthreads programming - a POSIX standard for better multiprocessing , 1996 .
[29] Luigi Lo Iacono. Understanding Cryptography , 2018, CCNA® Security Study Guide.
[30] Mostafa Belkasmi,et al. Bitcoin Security with Post Quantum Cryptography , 2019, NETYS.
[31] George Q. Huang,et al. Blockchain-based ubiquitous manufacturing: a secure and reliable cyber-physical system , 2020, Int. J. Prod. Res..
[32] D. Blayney,et al. Challenges and solutions. , 2007, Journal of oncology practice.
[33] B. Cambou,et al. Response-Based Cryptographic Methods with Ternary Physical Unclonable Functions , 2019, Lecture Notes in Networks and Systems.
[34] R. Monfared,et al. Blockchain ready manufacturing supply chain using distributed ledger , 2016 .
[35] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[36] Robert Campbell,et al. Evaluation of Post-Quantum Distributed Ledger Cryptography , 2019, The Journal of the British Blockchain Association.
[37] Joshua Lubell,et al. Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives , 2019, IEEE Access.
[38] S. Jagannatha,et al. Analysis of Blockchain technology: pros, cons and SWOT , 2018, Cluster Computing.
[39] Jing Shi,et al. Consensus-oriented cloud manufacturing based on blockchain technology: An exploratory study , 2020, Pervasive Mob. Comput..
[40] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[41] G. Edward Suh,et al. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations , 2011, TRUST.
[42] Arshdeep Bahga,et al. Blockchain Platform for Industrial Internet of Things , 2016 .
[43] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[44] Charles P. Pfleeger,et al. Security in computing , 1988 .
[45] Dawu Gu,et al. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[46] Tancrède Lepoint,et al. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation , 2017 .
[47] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[48] Mark Mohammad Tehranipoor,et al. An Aging-Resistant RO-PUF for Reliable Key Generation , 2016, IEEE Transactions on Emerging Topics in Computing.
[49] Joseph Sarkis,et al. Blockchain technology and its relationships to sustainable supply chain management , 2018, Int. J. Prod. Res..
[50] Dimitrios Sikeridis,et al. Two Post-Quantum Signature Use-cases: Non-issues, Challenges and Potential Solutions , 2019 .
[51] David Swanson,et al. The Supply Chain Has No Clothes: Technology Adoption of Blockchain for Supply Chain Transparency , 2018 .
[52] Saša Aksentijević,et al. Blockchain Technology Implementation in Logistics , 2019, Sustainability.
[53] Derek Abbott,et al. Emerging Physical Unclonable Functions With Nanotechnology , 2016, IEEE Access.
[54] Salil S. Kanhere,et al. Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.
[55] Sattar Mirzakuchaki,et al. PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI) , 2017, Int. J. Commun. Syst..
[56] Nikil D. Dutt,et al. Post-Quantum Lattice-Based Cryptography Implementations , 2019, ACM Comput. Surv..
[57] Joseph E. Kasten,et al. Engineering and Manufacturing on the Blockchain: A Systematic Review , 2020, IEEE Engineering Management Review.
[58] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[59] Alan T. Litchfield,et al. A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology , 2015, ACSC.
[60] Paulo S. L. M. Barreto,et al. The Lattice-Based Digital Signature Scheme qTESLA , 2020, IACR Cryptol. ePrint Arch..
[61] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[62] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..