{"title":"Enhancing RFID Security and Privacy by Physically Unclonable Functions","authors":"A. Sadeghi, Ivan Visconti, C. Wachsmann","doi":"10.1007/978-3-642-14452-3_13","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_13","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Duflot, Olivier Grumelard, O. Levillain, B. Morin
{"title":"On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation","authors":"L. Duflot, Olivier Grumelard, O. Levillain, B. Morin","doi":"10.1007/978-3-642-14452-3_16","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_16","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114307191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-counterfeiting: Mixing the Physical and the Digital World","authors":"D. Kirovski","doi":"10.1007/978-3-642-14452-3_10","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_10","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions","authors":"Roel Maes, I. Verbauwhede","doi":"10.1007/978-3-642-14452-3_1","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_1","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"License Distribution Protocols from Optical Media Fingerprints","authors":"Ghaith Hammouri, A. Dana, B. Sunar","doi":"10.1007/978-3-642-14452-3_9","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_9","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoo-jin Baek, Vanessa Gratzer, Sung-Hyun Kim, D. Naccache
{"title":"Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results","authors":"Yoo-jin Baek, Vanessa Gratzer, Sung-Hyun Kim, D. Naccache","doi":"10.1007/978-3-642-14452-3_8","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_8","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Lee, L. Batina, Dave Singelée, B. Preneel, I. Verbauwhede
{"title":"Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware","authors":"Y. Lee, L. Batina, Dave Singelée, B. Preneel, I. Verbauwhede","doi":"10.1007/978-3-642-14452-3_11","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_11","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}