Linked e-resources

Details

Introduction; 1 Overview; 2 Applications and Requirements of Fingerprints; 3 Types of Fingerprints; Types and Origins of Fingerprints; 1 Introduction; 2 Physical-Layer Device Identification; 2.1 General View; 2.2 Device Under Identification; 2.3 Identification Signals; 2.4 Features; 2.5 Device Fingerprints; 2.6 Physical-Layer Identification System; 2.7 System Performance and Design Issues; 2.8 Improving Physical-Layer Identification Systems; 3 State of the Art; 3.1 Transient-Based Approaches; 3.2 Modulation-Based Approaches; 3.3 Other Approaches

3.4 Attacking Physical-Layer Device Identification3.5 Summary and Conclusion; 4 Future Research Directions; 5 Conclusion; References; Device Measurement and Origin of Variation; 1 Introduction; 1.1 ABCD Parameters; 1.2 Proposed Model; 2 Measuring Parameters; 3 Determining Component Significance; 3.1 Constructing Model Input; 3.2 Producing Model Output; 3.3 Evaluating Model Output; 4 Conclusion; References; Crytpo-Based Methods and Fingerprints; 1 Introduction; 1.1 Authentication; 1.2 Key Generation; 2 Techniques; 2.1 Physical Unclonable Functions; 2.2 Controlled Physical Unclonable Functions

2.3 Clock Skew2.4 Wireless Devices; 2.5 Optical Media; 2.6 Trojan Detection; 2.7 Software Control; 3 Tradeoffs; 3.1 Benefits; 3.2 Drawbacks; 4 Summary; References; Fingerprinting by Design: Embedding and Authentication; 1 Background; 1.1 Intrinsic Fingerprints; 1.2 Fingerprint Embedding; 1.3 Fingerprinting and Communications; 2 Introduction to Embedded Authentication; 3 Framework for Embedded Authentication; 3.1 Authentication System
Transmitter; 3.2 Authentication System
Receiver; 3.3 Authentication Performance; 4 Metrics for Embedded Fingerprint Authentication; 4.1 Impact on Data BER

4.2 Authentication Performance4.3 Security Analysis; 4.4 Complexity; 5 Experimental Results; 5.1 Authentication Performance; 5.2 Key Equivocation; 5.3 Impact on Data BER; 6 Conclusions; References; Digital Fingerprint: A Practical Hardware Security Primitive; 1 Introduction; 2 Digital Fingerprinting for IP Protection; 2.1 Background on Fingerprinting; 2.2 The Need and Challenge of Digital Fingerprinting IPs; 2.3 Requirements of Digital Fingerprinting; 2.4 Iterative Fingerprinting Techniques; 2.5 Fingerprinting with Constraint-Addition; 3 Observability Don't Care Fingerprinting

3.1 Illustrative Example3.2 Observability Don't Care Conditions; 3.3 Finding Locations for Circuit Modification Based on ODCs; 3.4 Determining Potential Fingerprinting Modifications; 3.5 Maintaining Overhead Constraints; 3.6 Security Analysis; 4 Satisfiability Don't Care Fingerprinting; 4.1 Satisfiability Don't Care and Illustrative Example; 4.2 Assumptions for SDC Based Fingerprinting; 4.3 SDC Based Fingerprinting Technique; 4.4 Fingerprint Embedding Scheme; 4.5 Security Analysis; 5 Scan Chain Fingerprinting; 5.1 Illustrative Example; 5.2 Basics on Scan Chain Design

Browse Subjects

Show more subjects...

Statistics

from
to
Export