Related references
Note: Only part of the references are listed.A 3D Wrist Pulse Signal Acquisition System for Width Information of Pulse Wave
Chuanglu Chen et al.
SENSORS (2020)
Low-cost Security for Next-generation IoT Networks
Nikolaos Athanasios Anagnostopoulos et al.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2020)
Decay-Based DRAM PUFs in Commodity Devices
Andre Schaller et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Using Implicit Certification to Efficiently Establish Authenticated Group Keys for In-Vehicle Networks
Dominik Puellen et al.
2019 IEEE VEHICULAR NETWORKING CONFERENCE (VNC) (2019)
Thermal Covert Channels Leveraging Package-On-Package DRAM
Shuai Chen et al.
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)
Security Assessment of Systems of Systems
Miguel Angel Olivero et al.
2019 IEEE/ACM 7TH INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SYSTEMS-OF-SYSTEMS AND 13TH WORKSHOP ON DISTRIBUTED SOFTWARE DEVELOPMENT, SOFTWARE ECOSYSTEMS AND SYSTEMS-OF-SYSTEMS (SESOS-WDES 2019) (2019)
FPGA implementation of SRAM PUFs based cryptographically secure pseudo-random number generator
Shuai Chen et al.
MICROPROCESSORS AND MICROSYSTEMS (2018)
PUFs as Promising Tools for Security in Internet of Things
Debdeep Mukhopadhyay
IEEE DESIGN & TEST (2016)
Use of system of systems and decentralized optimization concepts for integrated traffic control via dynamic signalization and embedded speed recommendation
Ugnius Aliubavicius et al.
TRANSPORT RESEARCH ARENA TRA2016 (2016)
Practical and Secure IoT Device Authentication using Physical Unclonable Functions
John Ross Wallrabenstein
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016) (2016)
Physical Unclonable Functions and Applications: A Tutorial
Charles Herder et al.
PROCEEDINGS OF THE IEEE (2014)
The Internet of Things: The Next Technological Revolution
Mohamed Ali Feki et al.
COMPUTER (2013)
PUF Modeling Attacks on Simulated and Silicon Data
Ulrich Ruehrmair et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Hardware-Anchored Security Based on SRAM PUFs, Part 2
Helena Handschuh
IEEE SECURITY & PRIVACY (2012)
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Yevgeniy Dodis et al.
SIAM JOURNAL ON COMPUTING (2008)