2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN) 2012
DOI: 10.1109/icufn.2012.6261713
|View full text |Cite
|
Sign up to set email alerts
|

Securing home networks using Physically Unclonable Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…The advantages range from security guarantees for tamper evidence, tamper resistance and unclonability that are provided by Physically Unclonable Functions (PUF) and Physical Key Generation (PKG), rendering public key cryptography or a public key infrastructure obsolete. By combining both these technologies we are able to further enhance existing protocols, such [6] by PUFs and intend to reuse already existing hardware for reducing costs and the time-to-market.…”
Section: A Contributionmentioning
confidence: 99%
“…The advantages range from security guarantees for tamper evidence, tamper resistance and unclonability that are provided by Physically Unclonable Functions (PUF) and Physical Key Generation (PKG), rendering public key cryptography or a public key infrastructure obsolete. By combining both these technologies we are able to further enhance existing protocols, such [6] by PUFs and intend to reuse already existing hardware for reducing costs and the time-to-market.…”
Section: A Contributionmentioning
confidence: 99%