Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security of IoT systems: Design challenges and opportunities
Computer-aided design (CAD), in its quest to facilitate new design revolutions, is again on
the brink of changing its scope. Following both historical and recent technological and …
the brink of changing its scope. Following both historical and recent technological and …
[HTML][HTML] Game theory-based authentication framework to secure internet of vehicles with blockchain
The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse
access methods, IoV enables vehicles to connect with their surroundings. However, without …
access methods, IoV enables vehicles to connect with their surroundings. However, without …
Hardware obfuscation using PUF-based logic
There is a great need to develop universal and robust techniques for intellectual property
protection of integrated circuits. In this paper, we introduce techniques for the obfuscation of …
protection of integrated circuits. In this paper, we introduce techniques for the obfuscation of …
Position paper: Physical unclonable functions for iot security
Devices in the Internet of Things (IoT) introduce unique security challenges due to their
operating conditions and device limitations. Existing security solutions based on classical …
operating conditions and device limitations. Existing security solutions based on classical …
Design and analysis of stability-guaranteed PUFs
The lack of stability is one of the limitations that constrain physical unclonable function (PUF)
from being put in widespread practical use. In this paper, we propose a weak PUF and a …
from being put in widespread practical use. In this paper, we propose a weak PUF and a …
Strengthening industrial IoT security with integrated puf token
In the ever-evolving landscape of IoT device security, safeguarding data with confidentiality
and integrity stands as a paramount concern. This paper introduces an optimized approach …
and integrity stands as a paramount concern. This paper introduces an optimized approach …
Active hardware metering by finite state machine obfuscation
This chapter presents a detailed description and comprehensive discussion of the first
known method for active IC metering and IC piracy prevention which allow uniquely locking …
known method for active IC metering and IC piracy prevention which allow uniquely locking …
A digital PUF-based IP protection architecture for network embedded systems
JX Zheng, M Potkonjak - Proceedings of the tenth ACM/IEEE symposium …, 2014 - dl.acm.org
In this paper we present an architecture for a secure embedded system that is resilient to
tempering and code injection attacks and offers anti-piracy protection for the software and …
tempering and code injection attacks and offers anti-piracy protection for the software and …
LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity
Stability has always been one of the major limitations that constraints Physical Unclonable
Function (PUF) from being put in widespread practical use. In this paper, we propose a weak …
Function (PUF) from being put in widespread practical use. In this paper, we propose a weak …
A fully digital physical unclonable function based temperature sensor for secure remote sensing
Turnkey solutions that combine energy-efficient remote sensing and secure communication
of telemetry are desirable in data collection, risk control and situation appraisal with the …
of telemetry are desirable in data collection, risk control and situation appraisal with the …