Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of physical-layer authentication in wireless communications
N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
Physical unclonable functions and applications: A tutorial
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …
authentication and key generation applications. First, it motivates the use of PUFs versus …
Halide perovskite memristors as flexible and reconfigurable physical unclonable functions
Abstract Physical Unclonable Functions (PUFs) address the inherent limitations of
conventional hardware security solutions in edge-computing devices. Despite impressive …
conventional hardware security solutions in edge-computing devices. Despite impressive …
A puf taxonomy
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …
during communications. For security, it is important that these identities are complex, in order …
Concealable physically unclonable function chip with a memristor array
A physically unclonable function (PUF) is a creditable and lightweight solution to the mistrust
in billions of Internet of Things devices. Because of this remarkable importance, PUF need to …
in billions of Internet of Things devices. Because of this remarkable importance, PUF need to …
Physical unclonable functions (PUF) for IoT devices
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …
Revisiting silk: a lens-free optical physical unclonable function
For modern security, devices, individuals, and communications require unprecedentedly
unique identifiers and cryptographic keys. One emerging method for guaranteeing digital …
unique identifiers and cryptographic keys. One emerging method for guaranteeing digital …
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
PUF modeling attacks on simulated and silicon data
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
Fault analysis-based logic encryption
J Rajendran, H Zhang, C Zhang… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
Globalization of the integrated circuit (IC) design industry is making it easy for rogue
elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware Trojans. Due …
elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware Trojans. Due …