Towards Hardware-Intrinsic Security最新文献

筛选
英文 中文
Enhancing RFID Security and Privacy by Physically Unclonable Functions 通过物理不可克隆功能增强RFID的安全性和隐私性
Towards Hardware-Intrinsic Security Pub Date : 2009-07-01 DOI: 10.1007/978-3-642-14452-3_13
A. Sadeghi, Ivan Visconti, C. Wachsmann
{"title":"Enhancing RFID Security and Privacy by Physically Unclonable Functions","authors":"A. Sadeghi, Ivan Visconti, C. Wachsmann","doi":"10.1007/978-3-642-14452-3_13","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_13","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Strong PUFs: Models, Constructions, and Security Proofs 强puf:模型、构造和安全性证明
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_4
U. Rührmair, Heike Schröder, S. Katzenbeisser
{"title":"Strong PUFs: Models, Constructions, and Security Proofs","authors":"U. Rührmair, Heike Schröder, S. Katzenbeisser","doi":"10.1007/978-3-642-14452-3_4","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_4","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation 基于管理程序和虚拟机监视器的隔离的局限性
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_16
L. Duflot, Olivier Grumelard, O. Levillain, B. Morin
{"title":"On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation","authors":"L. Duflot, Olivier Grumelard, O. Levillain, B. Morin","doi":"10.1007/978-3-642-14452-3_16","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_16","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114307191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Anti-counterfeiting: Mixing the Physical and the Digital World 防伪:混合物理和数字世界
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_10
D. Kirovski
{"title":"Anti-counterfeiting: Mixing the Physical and the Digital World","authors":"D. Kirovski","doi":"10.1007/978-3-642-14452-3_10","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_10","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions 物理不可克隆功能:研究现状及未来研究方向
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_1
Roel Maes, I. Verbauwhede
{"title":"Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions","authors":"Roel Maes, I. Verbauwhede","doi":"10.1007/978-3-642-14452-3_1","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_1","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 451
License Distribution Protocols from Optical Media Fingerprints 基于光媒体指纹的许可证分发协议
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_9
Ghaith Hammouri, A. Dana, B. Sunar
{"title":"License Distribution Protocols from Optical Media Fingerprints","authors":"Ghaith Hammouri, A. Dana, B. Sunar","doi":"10.1007/978-3-642-14452-3_9","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_9","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results 从未知算法中提取未知密钥,加密未知固定消息,不返回结果
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_8
Yoo-jin Baek, Vanessa Gratzer, Sung-Hyun Kim, D. Naccache
{"title":"Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results","authors":"Yoo-jin Baek, Vanessa Gratzer, Sung-Hyun Kim, D. Naccache","doi":"10.1007/978-3-642-14452-3_8","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_8","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware Trojan Horses 硬件木马
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_7
M. Tehranipoor, B. Sunar
{"title":"Hardware Trojan Horses","authors":"M. Tehranipoor, B. Sunar","doi":"10.1007/978-3-642-14452-3_7","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_7","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware RFID系统的防伪、不可追溯性和其他安全挑战:基于公钥的协议和硬件
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_11
Y. Lee, L. Batina, Dave Singelée, B. Preneel, I. Verbauwhede
{"title":"Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware","authors":"Y. Lee, L. Batina, Dave Singelée, B. Preneel, I. Verbauwhede","doi":"10.1007/978-3-642-14452-3_11","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_11","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Hardware Intrinsic Security from Physically Unclonable Functions 物理不可克隆功能的硬件固有安全性
Towards Hardware-Intrinsic Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14452-3_2
H. Handschuh, G. Schrijen, P. Tuyls
{"title":"Hardware Intrinsic Security from Physically Unclonable Functions","authors":"H. Handschuh, G. Schrijen, P. Tuyls","doi":"10.1007/978-3-642-14452-3_2","DOIUrl":"https://doi.org/10.1007/978-3-642-14452-3_2","url":null,"abstract":"","PeriodicalId":159258,"journal":{"name":"Towards Hardware-Intrinsic Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121291447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信