In this work, we examine very briefly a number of Advanced Reconfigurable Physical Unclonable Functions (AR-PUFs) that can be used to enhance the security of devices used for the realisation of the Internet of Things (IoT) and Cyber-Physical Systems (CPS). To this end, we also present two practical lightweight protocols that can be implemented using such AR-PUFs on IoT and CPS devices, in order to significantly enhance their security, even allowing the security of such devices to be restored after they have been compromised
Physical systems are becoming increasingly computationally powerful as faster microprocessors are in...
Physically Unclonable Functions (PUFs) are security primitives that exploit intrinsic random physica...
Abstract—Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which ha...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The growing convergence among Information and Operation Technology worlds in modern Industrial Inter...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
This paper presents a overview over research activities in the field of Physically Unclonable Functi...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
<p>In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed.&...
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequen...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physical systems are becoming increasingly computationally powerful as faster microprocessors are in...
Physically Unclonable Functions (PUFs) are security primitives that exploit intrinsic random physica...
Abstract—Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which ha...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The growing convergence among Information and Operation Technology worlds in modern Industrial Inter...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
This paper presents a overview over research activities in the field of Physically Unclonable Functi...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
<p>In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed.&...
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequen...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physical systems are becoming increasingly computationally powerful as faster microprocessors are in...
Physically Unclonable Functions (PUFs) are security primitives that exploit intrinsic random physica...
Abstract—Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which ha...