Search

Your search keyword '"PUF"' showing total 41 results

Search Constraints

Start Over You searched for: Descriptor "PUF" Remove constraint Descriptor: "PUF" Publisher mdpi ag Remove constraint Publisher: mdpi ag
41 results on '"PUF"'

Search Results

1. Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme

2. A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC

3. PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks

4. Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment

5. On the Aging of OTFTs and Its Impact on PUFs Reliability

6. Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV

7. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications

8. PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication

9. A Power-Gated 8-Transistor Physically Unclonable Function Accelerates Evaluation Speeds

10. Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism

11. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network

12. Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments

13. Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm

14. Entropy Sources Based on Silicon Chips: True Random Number Generator and Physical Unclonable Function

15. A Unified PUF and Crypto Core Exploiting the Metastability in Latches

16. PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices

17. WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks

18. Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication

19. Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks

20. Area-Efficient Post-Processing Circuits for Physically Unclonable Function with 2-Mpixel CMOS Image Sensor

21. A Morphable Physically Unclonable Function and True Random Number Generator Using a Commercial Magnetic Memory

22. Effective RNA Regulation by Combination of Multiple Programmable RNA-Binding Proteins

23. A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF

24. NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch Filter

25. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

26. 39 fJ/bit On-Chip Identification ofWireless Sensors Based on Manufacturing Variation

27. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks

28. A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems

29. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges

30. PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT

31. Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks

32. Area-Efficient Post-Processing Circuits for Physically Unclonable Function with 2-Mpixel CMOS Image Sensor

33. FPGA Implementation of High-Efficiency ECC Point Multiplication Circuit

34. Effective RNA Regulation by Combination of Multiple Programmable RNA-Binding Proteins

35. NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch Filter

36. CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks

37. Effective RNA Regulation by Combination of Multiple Programmable RNA-Binding Proteins

38. A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF

39. 39 fJ/bit On-Chip Identification ofWireless Sensors Based on Manufacturing Variation

40. A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems

41. Hardware Activation by Means of PUFs and Elliptic Curve Cryptography in Field-Programmable Devices

Catalog

Books, media, physical & digital resources