In-memory computing with resistive switching devices
Modern computers are based on the von Neumann architecture in which computation and
storage are physically separated: data are fetched from the memory unit, shuttled to the …
storage are physically separated: data are fetched from the memory unit, shuttled to the …
A review of physical unclonable functions (PUFs) and its applications in IoT environment
A Yadav, S Kumar, J Singh - Ambient Communications and Computer …, 2022 - Springer
This paper describes various studies about physical unclonable functions, and it inspires
use of physical unclonable functions over conventional security mechanisms and compares …
use of physical unclonable functions over conventional security mechanisms and compares …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …
including personal health care, environmental monitoring, home automation, smart mobility …
Halide perovskite memristors as flexible and reconfigurable physical unclonable functions
Abstract Physical Unclonable Functions (PUFs) address the inherent limitations of
conventional hardware security solutions in edge-computing devices. Despite impressive …
conventional hardware security solutions in edge-computing devices. Despite impressive …
Structural color materials for optical anticounterfeiting
W Hong, Z Yuan, X Chen - Small, 2020 - Wiley Online Library
The counterfeiting of goods is growing worldwide, affecting practically any marketable item
ranging from consumer goods to human health. Anticounterfeiting is essential for …
ranging from consumer goods to human health. Anticounterfeiting is essential for …
A survey of physical-layer authentication in wireless communications
N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication
An ideal anti-counterfeiting technique has to be inexpensive, mass-producible,
nondestructive, unclonable and convenient for authentication. Although many anti …
nondestructive, unclonable and convenient for authentication. Although many anti …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …
controlling and monitoring of the connected smart objects. IoT applications range over a …
Machine learning for the detection and identification of Internet of Things devices: A survey
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …
variety of emerging services and applications. However, the presence of rogue IoT devices …