References
- J. R. Wallrabenstein, "Practical and Secure IoT Device Authentication Using Physical Unclonable Funtions", In IEEE 4th International Conference on Future Internet of Things and Cloud, 2016
- C. Javli et.al. "Demo abstract; Location fingerprint evidence and authorisation using WiFi channel characteristics", In IEEE PerCom Workshops, 2016
- J. Huang and T. Jiang, "Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics", In Security and Communication Networks, vol.8, no.13, pp 2329-2337, Sept. 2015 https://doi.org/10.1002/sec.1178
- W. Xiong et.al. "Run-time Accessible DRAM PUFs in Commodity Devices", In CHES 2016, LNCS 9813, pp 432-453, 2016
- Y. Cao et.al. "CMOS Image Sensor Based Physical Unclonable Function for Coherent Sensor-Level Authentication", In IEEE Transactions on Cricuits and Systems I, vol.62, no.11, pp. 262902640, 2015
- C, Huth et.al. "Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things", In IEEE Access, vo.5, pp. 11909-11926, Jun. 2017 https://doi.org/10.1109/ACCESS.2017.2713835
- G. Simmons, "A system for verifying user identity and authorization at the point of sale or access", Cryptologia, vol. 8, no. 1, pp. 1-21, 1984. https://doi.org/10.1080/0161-118491858737
- D. Lim, J. Lee, B. Gassend, G. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 10, pp. 1200-1205, 2005. https://doi.org/10.1109/TVLSI.2005.859470
- A Maiti, J. Casarona, L. McHale, and P. Schaumont, "A large scale characterization of RO-PUF", In HOST 2010, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 94-99, June 2010.
- Z. Cherif, J. Danger, S. Guilley, and L. Bossuet, "An Easy-to-Design PUF based on a single oscillator: the Loop PUF", In DSD 2012, Proceedings of Euromicro Conference on Digital System Design, September 2012.
-
T.W. Kim, B.D. Choi, and D.K. Kim, "Zero biterror rate ID generation circuit using via formation probability in 0.18
${\mu}m$ CMOS process", In Electronics Letters, vol. 50, no. 12, pp. 876-877, 2014. https://doi.org/10.1049/el.2013.3474 - D. Holcomb, W. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers", IEEE Trans. Computers, vol. 58, no. 9, pp. 1198-1210, September 2009. https://doi.org/10.1109/TC.2008.212
- W. Xiong, A. Schaller, N. Anagnostopoulos, M. Saleem, S. Gabmeyer. S. Katzenbeisser, and J. Szefer, "Run-time Accessible DRAM PUFs in Commodity Devices", In CHES 2016, Proceedings of Conference on Cryptographic Hardware and Embedded Systems, pp. 432-453, Santa Barbara, August 2016.
- I, Kumari, M. Oh, and D. Choi, "Rapid Run-time DRAM PUF based on Bit-Flip Position for Secure IoT Devices", To appear Proceeding of IEEE Sensors 2018
- A.K. Jain, R. Bolle, and S. Pankanti, "Biometrics: Personal Identification in Networked Society", Kluwer Academic Publications, ISBN 978-0-7923-8345-1, 1999