2009
DOI: 10.1007/978-3-642-03549-4_13
|View full text |Cite
|
Sign up to set email alerts
|

Optical DNA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…These early and sometimes rudimentary approaches usually focused on the forgery-proof labeling or tagging of valuable items, such as credit cards, passport, bank notes, paper stock certificates, branded consumer products, and the like, and thus arguably did not cover the full application spectrum of modern PUFs yet. They date back to as early as the late 1960s [39], and have resurfaced independently again in the 1980s [3,23], 1990s [10,27,71,74,83,86,87], and 2000s [7,9,11,14,28,70,89]. It seems that these methods remained more or less unnoted by the larger security community, though; to this day, they are not routinely quoted in the PUF-literature, unfortunately.…”
Section: Related Workmentioning
confidence: 99%
“…These early and sometimes rudimentary approaches usually focused on the forgery-proof labeling or tagging of valuable items, such as credit cards, passport, bank notes, paper stock certificates, branded consumer products, and the like, and thus arguably did not cover the full application spectrum of modern PUFs yet. They date back to as early as the late 1960s [39], and have resurfaced independently again in the 1980s [3,23], 1990s [10,27,71,74,83,86,87], and 2000s [7,9,11,14,28,70,89]. It seems that these methods remained more or less unnoted by the larger security community, though; to this day, they are not routinely quoted in the PUF-literature, unfortunately.…”
Section: Related Workmentioning
confidence: 99%
“…Already prior to PUFs, a side strand of physical security research had suggested (in today's parlance) early forms of secret-free, unforgeable physical tags or labels. These approaches date back to as early as the late 1960s [39], and have resurfaced independently again in the 1980s [3,23], 1990s [10,25,51,52,67,68,79], and 2000s [7,9,11,14,26,71,81]. It seems some of these methods went mostly unnoticed by the larger security community, though; to this day, they are not routinely quoted in the PUF-literature, unfortunately.…”
Section: Related Workmentioning
confidence: 99%
“…Storage media like CDs/DVDs possess unique physical properties on a sub-digital, analog level [26,81], even if they store exactly the same digital content. Building on this observation, any digital content on CDs/DVDs can be certified, again using digital signatures in combination with the physically unique features of each CD [26,81], as in Section 6.4. Customary CD/DVD-readers can then serve as widespread, inexpensive, but surprisingly accurate measurement devices, as demonstrated in [26,81].…”
Section: Secret-free Digital Rights Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Again, in combination these features are not met by any comparable technique known to the author. In [38], [39], [40], for example, the random features of the data carrier must be determined in the near-field by analog measurements. The features must be communicated correctly by the analog measurement apparatus (e.g., the optical drive) to a central module (e.g., a TPM) that decides about the validity of the content, meaning that the measurement apparatus must be trusted.…”
Section: B Two Other Applications: Unforgeable Labels and Drmmentioning
confidence: 99%