Using Memristor Arrays as Physical Unclonable Functions

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 3
1. Verfasser: Frank, Florian (VerfasserIn)
Weitere Verfasser: Arul, Tolga (VerfasserIn), Anagnostopoulos, Nikolaos Athanasios (VerfasserIn), Katzenbeisser, Stefan (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Polymorphic Protocols at the Example of Mitigating Web Bots 2022 See, August
Large Scale Analysis of DoH Deployment on the Internet 2022 García, Sebastián
PEA: Practical Private Epistasis Analysis Using MPC 2022 Hamacher, Kay
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems 2022 Liu, Zeyan
FLMJR: Improving Robustness of Federated Learning via Model Stability 2022 Guo, Qi
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses 2022 Tekgul, Buse G. A.
Can Industrial Intrusion Detection Be SIMPLE? 2022 Wolsing, Konrad
Detecting Cross-language Memory Management Issues in Rust 2022 Li, Zhuohua
Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords 2022 Mølmark-O’Connor, Daniel
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation 2022 Aly, Abdelrahaman
Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet 2022 Yue, Feng
A Formal Analysis of the FIDO2 Protocols 2022 Guan, Jingjing
Unlinkable Delegation of WebAuthn Credentials 2022 Frymann, Nick
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations 2022 Reynolds, Joshua
Protocols for a Two-Tiered Trusted Computing Base 2022 Moreira, José
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference 2022 Zhu, Wenxing
Using Memristor Arrays as Physical Unclonable Functions 2022 Frank, Florian
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks 2022 Amro, Ahmed
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection 2022 Cardaioli, Matteo
MixCT: Mixing Confidential Transactions from Homomorphic Commitment 2022 Du, Jiajun
Alle Artikel auflisten