Search

Your search keyword '"PUF"' showing total 841 results

Search Constraints

Start Over You searched for: Descriptor "PUF" Remove constraint Descriptor: "PUF"
841 results on '"PUF"'

Search Results

2. CoDPoC IP: A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme

3. A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks.

4. A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment.

5. Advanced security framework for low Earth orbit satellites in space information network.

6. An efficient hybrid multifactor mutual authentication and session key agreement scheme for patient monitoring system using IoMT.

7. Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing.

8. CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF.

9. Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme.

10. Security authentication scheme based on chebyshev chaotic mapping for library network

11. Advanced security framework for low Earth orbit satellites in space information network

12. Benzoyl peroxide encapsulation in poly(urea‐formaldehyde) microcapsules for use in dental materials.

13. A biometric and PUF-based authentication with Preserving anonymity in smart grid environment

14. Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions

15. Cryptographic Security Through a Hardware Root of Trust

16. Two-Factor Authentication for Internet of Drones Using PUF and Blockchain

17. A PUF-Based Secure Boot for RISC-V Architectures

18. An Ultra Low Voltage Physical Unclonable Function Exploiting Body-Driven

23. Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment.

24. A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices.

25. Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication.

26. Stimulated Microcontroller Dataset for New IoT Device Identification Schemes through On-Chip Sensor Monitoring.

27. Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems.

28. A fog‐driven three‐factor authentication protocol for secure data sharing in Internet of Vehicles cyber‐physical systems.

29. On the Aging of OTFTs and Its Impact on PUFs Reliability.

30. 一种适用于物联网设备的基于异或门的 Pico 物理不 可克隆函数.

31. PSAF-IoT: Physically Secure Authentication Framework for the Internet of Things

32. PufParkChain: Secure and Smart Parking Based on PUF Authentication and Lightweight Blockchain

34. Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV.

35. A novel DAG-blockchain structure for trusted routing in secure MANET-IoT environment.

36. Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications.

37. A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN.

38. SoC Virtual Platform with Secure Key Generation Module for Embedded Secure Devices.

39. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.

40. A Reconfigurable SRAM CRP PUF with High Reliability and Randomness.

41. TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor.

42. Recursive Challenge Feed Arbiter Physical Unclonable Function (RC-FAPUF) In 180nm Process For Reliable Key Generation In IOT Security.

43. An AES Implementation with Improved PDL Based PUF Key Generator for IoT Devices.

44. A service-categorized security scheme with physical unclonable functions for internet of vehicles

45. Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme

46. A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC

47. The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption

48. CAD for PUF Security

50. Accountability of IoT Devices

Catalog

Books, media, physical & digital resources