Author:
Anagnostopoulos Nikolaos,Katzenbeisser Stefan,Chandy John,Tehranipoor Fatemeh
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference98 articles.
1. Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations
2. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon;Katzenbeisser,2012
3. DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication
4. Run-Time Accessible DRAM PUFs in Commodity Devices;Xiong,2016
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. sIOPMP: Scalable and Efficient I/O Protection for TEEs;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2024-04-27
2. Efficient Distributed Secure Memory with Migratable Merkle Tree;2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA);2023-02
3. Design, build, and analyse hardware-based security primitives that work well;2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC);2022-11-18
4. Hardware Security Primitives Based on Emerging Technologies;Hardware Security Primitives;2022-10-12
5. Using Physically Unclonable Function for Increasing Security of Internet of Things;Lecture Notes in Networks and Systems;2022