Search

Your search keyword '"PUF"' showing total 40 results

Search Constraints

Start Over You searched for: Descriptor "PUF" Remove constraint Descriptor: "PUF" Publisher mdpi Remove constraint Publisher: mdpi
40 results on '"PUF"'

Search Results

1. Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme.

2. Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment.

3. Stimulated Microcontroller Dataset for New IoT Device Identification Schemes through On-Chip Sensor Monitoring.

4. On the Aging of OTFTs and Its Impact on PUFs Reliability.

5. Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV.

6. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications.

7. A Reconfigurable SRAM CRP PUF with High Reliability and Randomness.

8. Integrating Lorenz Hyperchaotic Encryption with Ring Oscillator Physically Unclonable Functions (RO-PUFs) for High-Throughput Internet of Things (IoT) Applications.

9. A Power-Gated 8-Transistor Physically Unclonable Function Accelerates Evaluation Speeds.

10. PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication.

11. Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism.

12. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network.

13. A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks.

14. Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments.

15. Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm.

16. PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT.

17. Provable Secure Authentication Protocol in Fog-Enabled Smart Home Environment.

18. WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.

19. A Unified PUF and Crypto Core Exploiting the Metastability in Latches.

20. PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices.

21. Design and Implementation of Real-Time Image Acquisition Chip Based on Triple-Hybrid Encryption System.

22. Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication.

23. Effective RNA Regulation by Combination of Multiple Programmable RNA-Binding Proteins.

24. A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF.

25. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks.

26. 39 fJ/bit On-Chip Identification of Wireless Sensors Based on Manufacturing Variation.

27. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks.

28. Hardware Security of Fog End-Devices for the Internet of Things

29. Entropy Sources Based on Silicon Chips: True Random Number Generator and Physical Unclonable Function.

30. SRAM-Based PUF Reliability Prediction Using Cell-Imbalance Characterization in the State Space Diagram.

31. Area-Efficient Post-Processing Circuits for Physically Unclonable Function with 2-Mpixel CMOS Image Sensor.

32. Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks.

33. FPGA Implementation of High-Efficiency ECC Point Multiplication Circuit.

34. CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks.

35. A Morphable Physically Unclonable Function and True Random Number Generator Using a Commercial Magnetic Memory.

36. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks

37. Hardware Security of Fog End-Devices for the Internet of Things.

38. A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems.

39. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges.

40. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

Catalog

Books, media, physical & digital resources