Artykuły w czasopismach na temat „Hardware Security Primitives”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Hardware Security Primitives”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Labrado, Carson, i Himanshu Thapliyal. "Hardware Security Primitives for Vehicles". IEEE Consumer Electronics Magazine 8, nr 6 (1.11.2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.
Pełny tekst źródłaHuffmire, Ted, Timothy Levin, Thuy Nguyen, Cynthia Irvine, Brett Brotherton, Gang Wang, Timothy Sherwood i Ryan Kastner. "Security Primitives for Reconfigurable Hardware-Based Systems". ACM Transactions on Reconfigurable Technology and Systems 3, nr 2 (maj 2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.
Pełny tekst źródłaGordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian i Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions". Cryptography 5, nr 1 (4.02.2021): 7. http://dx.doi.org/10.3390/cryptography5010007.
Pełny tekst źródłaZhang, Zhiming, i Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems". Journal of Low Power Electronics and Applications 8, nr 4 (27.11.2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Pełny tekst źródłaBi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier i Yier Jin. "Emerging Technology-Based Design of Primitives for Hardware Security". ACM Journal on Emerging Technologies in Computing Systems 13, nr 1 (6.12.2016): 1–19. http://dx.doi.org/10.1145/2816818.
Pełny tekst źródłaDubrova, Elena. "Energy-efficient cryptographic primitives". Facta universitatis - series: Electronics and Energetics 31, nr 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.
Pełny tekst źródłaVenkataraman, Anusha, Eberechukwu Amadi i Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks". Micro 2, nr 3 (21.06.2022): 361–68. http://dx.doi.org/10.3390/micro2030024.
Pełny tekst źródłaTsantikidou, Kyriaki, i Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare". Cryptography 6, nr 3 (1.09.2022): 45. http://dx.doi.org/10.3390/cryptography6030045.
Pełny tekst źródłaTomecek, Jozef. "Hardware optimizations of stream cipher rabbit". Tatra Mountains Mathematical Publications 50, nr 1 (1.12.2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Pełny tekst źródłaPreetisudha Meher, Lukram Dhanachandra Singh,. "Advancing Hardware Security: A Review and Novel Design of Configurable Arbiter PUF with DCM-Induced Metastability for Enhanced Resource Efficiency and Unpredictability". Tuijin Jishu/Journal of Propulsion Technology 45, nr 01 (16.02.2024): 3804–16. http://dx.doi.org/10.52783/tjjpt.v45.i01.4934.
Pełny tekst źródłaChakraborty, Suvradip, Janaka Alawatugoda i Chandrasekaran Pandu Rangan. "New approach to practical leakage-resilient public-key cryptography". Journal of Mathematical Cryptology 14, nr 1 (11.07.2020): 172–201. http://dx.doi.org/10.1515/jmc-2019-0014.
Pełny tekst źródłaAmsaad, Fathi, Mohammed Niamat, Amer Dawoud i Selcuk Kose. "Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks". Information 9, nr 9 (3.09.2018): 224. http://dx.doi.org/10.3390/info9090224.
Pełny tekst źródłaEl Hadj Youssef, Wajih, Ali Abdelli, Fethi Dridi i Mohsen Machhout. "Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications". Security and Communication Networks 2020 (29.11.2020): 1–13. http://dx.doi.org/10.1155/2020/8860598.
Pełny tekst źródłaBathalapalli, Venkata K. V. V., Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer i Bibhudutta Rout. "PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems". Sensors 24, nr 3 (31.01.2024): 938. http://dx.doi.org/10.3390/s24030938.
Pełny tekst źródłaLara-Nino, Carlos Andres, Arturo Diaz-Perez i Miguel Morales-Sandoval. "Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN". Security and Communication Networks 2018 (4.09.2018): 1–14. http://dx.doi.org/10.1155/2018/5087065.
Pełny tekst źródłaRussinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy". Queue 21, nr 4 (31.08.2023): 44–48. http://dx.doi.org/10.1145/3623461.
Pełny tekst źródłaChung, Kai-Min, Marios Georgiou, Ching-Yi Lai i Vassilis Zikas. "Cryptography with Disposable Backdoors". Cryptography 3, nr 3 (20.08.2019): 22. http://dx.doi.org/10.3390/cryptography3030022.
Pełny tekst źródłaAl-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane i Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT". Sensors 20, nr 7 (31.03.2020): 1963. http://dx.doi.org/10.3390/s20071963.
Pełny tekst źródłaNili, Hussein, Gina C. Adam, Brian Hoskins, Mirko Prezioso, Jeeson Kim, M. Reza Mahmoodi, Farnood Merrikh Bayat, Omid Kavehei i Dmitri B. Strukov. "Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors". Nature Electronics 1, nr 3 (marzec 2018): 197–202. http://dx.doi.org/10.1038/s41928-018-0039-7.
Pełny tekst źródłaGómez-Marín, Ernesto, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo i Davide Martintoni. "An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain". Applied Sciences 13, nr 18 (19.09.2023): 10477. http://dx.doi.org/10.3390/app131810477.
Pełny tekst źródłaBoovaraghavan, Sudershan, Chen Chen, Anurag Maravi, Mike Czapik, Yang Zhang, Chris Harrison i Yuvraj Agarwal. "Mites". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, nr 1 (27.03.2022): 1–32. http://dx.doi.org/10.1145/3580865.
Pełny tekst źródłaZhu, Lianghong, Huaikun Xiang i Kai Zhang. "A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks". Symmetry 14, nr 1 (30.12.2021): 46. http://dx.doi.org/10.3390/sym14010046.
Pełny tekst źródłaKorona, Mateusz, Radosław Giermakowski, Mateusz Biernacki i Mariusz Rawski. "Lightweight Strong PUF for Resource-Constrained Devices". Electronics 13, nr 2 (14.01.2024): 351. http://dx.doi.org/10.3390/electronics13020351.
Pełny tekst źródłaAsif, Rameez, Kinan Ghanem i James Irvine. "Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy". Sensors 21, nr 1 (23.12.2020): 28. http://dx.doi.org/10.3390/s21010028.
Pełny tekst źródłaChen, Xue Dong, i Bao Peng. "A Security Localization Method in Wireless Sensor Networks". Advanced Materials Research 186 (styczeń 2011): 193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.186.193.
Pełny tekst źródłaBernard, Florent, Viktor Fischer i Boyan Valtchanov. "Mathematical model of physical RNGs based on coherent sampling". Tatra Mountains Mathematical Publications 45, nr 1 (1.12.2010): 1–14. http://dx.doi.org/10.2478/v10127-010-0001-1.
Pełny tekst źródłaHardin, David. "Hardware/Software Co-Assurance for the Rust Programming Language Applied to Zero Trust Architecture Development". ACM SIGAda Ada Letters 42, nr 2 (5.04.2023): 55–61. http://dx.doi.org/10.1145/3591335.3591340.
Pełny tekst źródłaNoseda, Mario, Lea Zimmerli, Tobias Schläpfer i Andreas Rüst. "Performance Analysis of Secure Elements for IoT". IoT 3, nr 1 (21.12.2021): 1–28. http://dx.doi.org/10.3390/iot3010001.
Pełny tekst źródłaScholz, Alexander, Lukas Zimmermann, Axel Sikora, Mehdi B. Tahoori i Jasmin Aghassi-Hagmann. "Embedded Analog Physical Unclonable Function System to Extract Reliable and Unique Security Keys". Applied Sciences 10, nr 3 (21.01.2020): 759. http://dx.doi.org/10.3390/app10030759.
Pełny tekst źródłaUpadhyaya, Devanshi, Maël Gay i Ilia Polian. "Locking-Enabled Security Analysis of Cryptographic Circuits". Cryptography 8, nr 1 (5.01.2024): 2. http://dx.doi.org/10.3390/cryptography8010002.
Pełny tekst źródłaSerrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham i Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3". Cryptography 6, nr 2 (17.06.2022): 30. http://dx.doi.org/10.3390/cryptography6020030.
Pełny tekst źródłaMadushan, Hasindu, Iftekhar Salam i Janaka Alawatugoda. "A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses". Electronics 11, nr 24 (15.12.2022): 4199. http://dx.doi.org/10.3390/electronics11244199.
Pełny tekst źródłaMaolood, Abeer Tariq, Alaa Kadhim Farhan, Wageda I. El-Sobky, Hany Nasry Zaky, Hossam L. Zayed, Hossam E. Ahmed i Tamer O. Diab. "Fast Novel Efficient S-Boxes with Expanded DNA Codes". Security and Communication Networks 2023 (18.04.2023): 1–19. http://dx.doi.org/10.1155/2023/5767102.
Pełny tekst źródłaMartin, Honorio, Pedro Martin-Holgado, Yolanda Morilla, Luis Entrena i Enrique San-Millan. "Total Ionizing Dose Effects on a Delay-Based Physical Unclonable Function Implemented in FPGAs". Electronics 7, nr 9 (24.08.2018): 163. http://dx.doi.org/10.3390/electronics7090163.
Pełny tekst źródłaChattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew i Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability". ACM Transactions on Design Automation of Electronic Systems 26, nr 6 (30.11.2021): 1–24. http://dx.doi.org/10.1145/3460004.
Pełny tekst źródłaAlkanhal, Mona, Abdulaziz Alali i Mohamed Younis. "A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV". IoT 5, nr 1 (30.12.2023): 1–19. http://dx.doi.org/10.3390/iot5010001.
Pełny tekst źródłaZhou, Zhen, Debiao He, Zhe Liu, Min Luo i Kim-Kwang Raymond Choo. "A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme". ACM Transactions on Reconfigurable Technology and Systems 14, nr 2 (5.06.2021): 1–21. http://dx.doi.org/10.1145/3447812.
Pełny tekst źródłaIbrahim, Atef, i Fayez Gebali. "Energy-Efficient Word-Serial Processor for Field Multiplication and Squaring Suitable for Lightweight Authentication Schemes in RFID-Based IoT Applications". Applied Sciences 11, nr 15 (28.07.2021): 6938. http://dx.doi.org/10.3390/app11156938.
Pełny tekst źródłaRojas-Muñoz, Luis F., Santiago Sánchez-Solano, Macarena C. Martínez-Rodríguez i Piedad Brox. "On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices". Sensors 23, nr 8 (18.04.2023): 4070. http://dx.doi.org/10.3390/s23084070.
Pełny tekst źródłaKumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas i Karan Rawat. "PUF-based user access control scheme for IoT environment". Journal of Information and Optimization Sciences 44, nr 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.
Pełny tekst źródłaEllinidou, Soultana, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch i Jean-Michel Dricot. "SSPSoC: A Secure SDN-Based Protocol over MPSoC". Security and Communication Networks 2019 (18.03.2019): 1–11. http://dx.doi.org/10.1155/2019/4869167.
Pełny tekst źródłaFrank, Florian, Simon Böttger, Nico Mexis, Nikolaos Athanasios Anagnostopoulos, Ali Mohamed, Martin Hartmann, Harald Kuhn i in. "CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based Physical Unclonable Functions". Nanomaterials 13, nr 22 (11.11.2023): 2930. http://dx.doi.org/10.3390/nano13222930.
Pełny tekst źródłaSánchez-Solano, Santiago, Eros Camacho-Ruiz, Macarena C. Martínez-Rodríguez i Piedad Brox. "Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems". Sensors 22, nr 5 (7.03.2022): 2057. http://dx.doi.org/10.3390/s22052057.
Pełny tekst źródłaI Mhaibes, Hakeem, i Shahnawaz Qadir. "A Lightweight Authentication Framework for Wireless Sensor Networks". International journal of electrical and computer engineering systems 13, nr 13 (3.02.2022): 19–27. http://dx.doi.org/10.32985/ijeces.13.1.3.
Pełny tekst źródłaRao, Muzaffar, Thomas Newe, Ian Grout i Avijit Mathur. "High Speed Implementation of a SHA-3 Core on Virtex-5 and Virtex-6 FPGAs". Journal of Circuits, Systems and Computers 25, nr 07 (22.04.2016): 1650069. http://dx.doi.org/10.1142/s0218126616500699.
Pełny tekst źródłaKurra, Anil Kumar, i Usha Rani Nelakuditi. "A Reliable Current Starved Inverter based Arbiter Puf Architecture for Iot Applications". International Journal of Engineering and Advanced Technology 9, nr 1s5 (30.12.2019): 163–67. http://dx.doi.org/10.35940/ijeat.a1038.1291s519.
Pełny tekst źródłaFalas, Solon, Charalambos Konstantinou i Maria K. Michael. "A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems". ACM Journal on Emerging Technologies in Computing Systems 18, nr 1 (31.01.2022): 1–19. http://dx.doi.org/10.1145/3460234.
Pełny tekst źródłaUeno, Rei, Naofumi Homma, Akiko Inoue i Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 1 (4.12.2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Pełny tekst źródłaBanerjee, Soumya, Ashok Kumar Das, Samiran Chattopadhyay, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues i Youngho Park. "Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment". Electronics 10, nr 12 (12.06.2021): 1417. http://dx.doi.org/10.3390/electronics10121417.
Pełny tekst źródłaIbrahim, Atef, i Fayez Gebali. "Word-Based Systolic Processor for Field Multiplication and Squaring Suitable for Cryptographic Processors in Resource-Constrained IoT Systems". Electronics 10, nr 15 (25.07.2021): 1777. http://dx.doi.org/10.3390/electronics10151777.
Pełny tekst źródła