咨询与建议

限定检索结果

文献类型

  • 158 篇 期刊文献
  • 109 篇 会议
  • 14 篇 学位论文

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 256 篇 工学
    • 150 篇 电气工程
    • 145 篇 计算机科学与技术...
    • 52 篇 信息与通信工程
    • 42 篇 材料科学与工程(可...
    • 19 篇 电子科学与技术(可...
    • 16 篇 软件工程
    • 14 篇 控制科学与工程
    • 9 篇 仪器科学与技术
    • 9 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 光学工程
    • 3 篇 环境科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 石油与天然气工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 船舶与海洋工程
  • 54 篇 理学
    • 35 篇 物理学
    • 26 篇 化学
    • 7 篇 生物学
    • 6 篇 数学
    • 2 篇 系统科学
  • 11 篇 管理学
    • 11 篇 管理科学与工程(可...
  • 4 篇 医学
    • 4 篇 临床医学

主题

  • 281 篇 physical unclona...
  • 41 篇 authentication
  • 41 篇 hardware securit...
  • 31 篇 security
  • 25 篇 internet of thin...
  • 23 篇 fpga
  • 19 篇 physical unclona...
  • 18 篇 reliability
  • 17 篇 machine learning
  • 16 篇 puf
  • 13 篇 ring oscillator
  • 13 篇 cryptography
  • 10 篇 key generation
  • 9 篇 fuzzy extractor
  • 9 篇 blockchain
  • 9 篇 uniqueness
  • 8 篇 anticounterfeiti...
  • 8 篇 sram
  • 7 篇 error correction
  • 7 篇 protocols

机构

  • 5 篇 ulm univ inst co...
  • 4 篇 bogazici univ de...
  • 4 篇 texas tech univ ...
  • 4 篇 tubitak natl res...
  • 3 篇 prince sattam bi...
  • 3 篇 anhui normal uni...
  • 3 篇 univ jeddah fac ...
  • 3 篇 lehigh univ dept...
  • 3 篇 virginia tech | ...
  • 3 篇 univ connecticut...
  • 3 篇 western washingt...
  • 3 篇 tech univ munich...
  • 2 篇 tech univ munich...
  • 2 篇 ruhr univ bochum...
  • 2 篇 univ sheffield d...
  • 2 篇 school of optica...
  • 2 篇 fraunhofer inst ...
  • 2 篇 guangdong univ t...
  • 2 篇 united int univ ...
  • 2 篇 int inst informa...

作者

  • 6 篇 ruehrmair ulrich
  • 6 篇 li bing
  • 6 篇 fischer robert f...
  • 6 篇 dundar gunhan
  • 6 篇 devadas srinivas
  • 6 篇 chen shuai
  • 6 篇 komurcu giray
  • 5 篇 pehl michael
  • 5 篇 mueelich sven
  • 5 篇 pusane ali emre
  • 5 篇 aseeri ahmad o.
  • 4 篇 guajardo jorge
  • 4 篇 alkatheiri moham...
  • 4 篇 koushanfar farin...
  • 4 篇 hiller matthias
  • 4 篇 majzoobi mehrdad
  • 4 篇 mesaritakis char...
  • 4 篇 baturone ilumina...
  • 4 篇 zhuang yu
  • 3 篇 cao yuan

语言

  • 270 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"主题词=Physical Unclonable Functions"
281 条 记 录,以下是1-10 订阅
排序:
Template-Guided Nondeterministic Assembly of Organosilica Nanodots for Multifunctional physical unclonable functions
收藏 引用
ACS APPLIED MATERIALS & INTERFACES 2025年 第2期17卷 4124-4136页
作者: Liu, Ying Zhang, Manman Wang, Chiyu Meng, Xianrui Fang, Xiaomin Zhang, Wenkai Ding, Tao Liu, Dun Lee, Gil Ju Chen, Xudong Henan Univ Coll Chem & Mol Sci Henan Key Lab Polyoxometalate Chem Kaifeng 475004 Peoples R China Chem & Chem Engn Guangdong Lab Jieyang Branch Jieyang 515200 Peoples R China Hubei Univ Technol Sch Mech Engn Laser Grp Wuhan 430068 Peoples R China Pusan Natl Univ Sch Elect & Elect Engn Busan 46241 South Korea
Optical physical unclonable functions (PUFs) are gaining attention as a robust security solution for identification in the expanding Internet of Things (IoT). To enhance the security and functionality of PUFs, integra... 详细信息
来源: 评论
Learnability of Optical physical unclonable functions Through the Lens of Learning With Errors
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 886-897页
作者: Albright, Apollo Gelfand, Boris Dixon, Michael Alamos Natl Lab Phys Condensed Matter & Complex Syst Grp Los Alamos NM 87545 USA Boston Univ Dept Phys Boston MA 02215 USA Los Alamos Natl Lab Los Alamos NM USA Los Alamos Natl Labs Adv Res Cyber Syst Grp Los Alamos NM USA
We show that a class of optical physical unclonable functions (PUFs) can be efficiently PAC-learned to arbitrary precision with arbitrarily high probability, even in the presence of intentionally injected noise, given... 详细信息
来源: 评论
Femtosecond Laser-Induced Recrystallized Nanotexturing for Identity Document Security With physical unclonable functions
收藏 引用
ADVANCED SCIENCE 2025年 第1期12卷 e2411449页
作者: Niu, Panpan Geng, Jiao Jiang, Qilin Wang, Yangyundou Sang, Jianxin Wang, Zhenghong Shi, Liping Xidian Univ Hangzhou Inst Technol Hangzhou 311231 Peoples R China Xidian Univ Sch Optoelect Engn Xian 710126 Peoples R China Shanghai Guanzhong Opt Technol Co Ltd Shanghai 201900 Peoples R China
Counterfeit identity (ID) documents pose a serious threat to personal credit and national security. As a promising candidate, optical physical unclonable functions (PUFs) offer a robust defense mechanism against count... 详细信息
来源: 评论
Roulette-Inspired physical unclonable functions: Stochastic yet Deterministic Multi-Bit Patterning through the Solutal Marangoni Effect
收藏 引用
ADVANCED FUNCTIONAL MATERIALS 2025年
作者: Cho, Yeongin Pyeon, Jeongsu Jang, Hanhwi Mun, Gwangsik Kang, Jaimin Park, Byong-Guk Kim, Geon Yeong Kim, Hyoungsoo Jung, Yeon Sik Korea Adv Inst Sci & Technol KAIST Dept Mat Sci & Engn Daejeon 34141 South Korea Korea Adv Inst Sci & Technol KAIST Dept Mech Engn Daejeon 34141 South Korea
physical unclonable functions (PUFs) have emerged as a hardware-based alternative to traditional cryptographic methods, which can be vulnerable to various types of threats, including physical tampering. PUFs exploit t... 详细信息
来源: 评论
physical unclonable functions Based on Photothermal Effect of Gold Nanoparticles
收藏 引用
ACS APPLIED MATERIALS & INTERFACES 2024年 第14期16卷 17954-17964页
作者: Wang, Zhiyuan Wang, Hu Li, Fenghua Gao, Xinyu Shao, Yuchuan Chinese Acad Sci Shanghai Inst Opt & Fine Mech Lab Thin Film Opt Shanghai 201800 Peoples R China Univ Chinese Acad Sci Ctr Mat Sci & Optoelect Engn Beijing 100049 Peoples R China Chinese Acad Sci Shanghai Inst Opt & Fine Mech Key Lab Mat High Power Laser Shanghai 201800 Peoples R China Univ Chinese Acad Sci Hangzhou Inst Adv Study Hangzhou 310024 Peoples R China
physical unclonable functions (PUFs) based on uncontrollable fabrication randomness are promising candidates for anticounterfeiting applications. Currently, the most popular optical PUFs are generally constructed from... 详细信息
来源: 评论
physical unclonable functions: A Primer
收藏 引用
IEEE SECURITY & PRIVACY 2014年 第6期12卷 97-101页
作者: Bauer, Todd Hamlet, Jason Sandia Natl Labs Livermore CA 94550 USA
physical unclonable functions (PUFs) make use of the measurable intrinsic randomness of physical systems to establish signatures for those systems. PUFs provide a means to generate unique keys that don"t need to ... 详细信息
来源: 评论
physical unclonable functions Based on Transient Form of Memristors for Emergency Defenses
IEEE ELECTRON DEVICE LETTERS
收藏 引用
IEEE ELECTRON DEVICE LETTERS 2022年 第3期43卷 378-381页
作者: Sun, Jing Wang, Zhan Wang, Saisai Yang, Mei Gao, Haixia Wang, Hong Ma, Xiaohua Hao, Yue Xidian Univ Sch Adv Mat & Nanotechnol Xian 710126 Peoples R China Xidian Univ Key Lab Wide Band Gap Semicond Technol Xian 710071 Peoples R China Xidian Univ Guangzhou Inst Technol Guangzhou 510555 Peoples R China Xian Univ Posts & Telecommun Sch Elect Engn Xian 710061 Peoples R China Xidian Univ Sch Microelect Key Lab Wide Band Gap Semicond Technol Xian 710071 Peoples R China
In this letter, transient form of diffusive memristors with cross-point structure of W/Ag/MgO/Ag/W for physical unclonable functions (PUF) were proposed for the first time. The stochastic dispersion of Ag in MgO switc... 详细信息
来源: 评论
physical unclonable functions with Improved Robustness Based on Polar Codes
Physical Unclonable Functions with Improved Robustness Based...
收藏 引用
IEEE International Workshop on Signal Processing Systems (SiPS)
作者: Bai, Yonghong Yan, Zhiyuan Lehigh Univ Dept Elect & Comp Engn Bethlehem PA 18015 USA
Since physical unclonable functions (PUFs) are considered for various security applications such as authentication and key generation, the robustness of PUFs is vital. In prior works, various error correction codes, s... 详细信息
来源: 评论
physical unclonable functions based Hardware Obfuscation Techniques: A State of the Art  16
Physical Unclonable Functions based Hardware Obfuscation Tec...
收藏 引用
16th Iberian Conference on Information Systems and Technologies (CISTI)
作者: Kareem, Husam Dunaev, Dmitriy Budapest Univ Technol & Econ Dept Automat & Appl Informat Budapest Hungary
A clear majority of electronic devices applications used in our daily life require a reliable, secure architecture, e.g., healthcare, social security cards, electronic meters, and smart homes. As a result, many studie... 详细信息
来源: 评论
physical unclonable functions-based Linear Encryption against Code Reuse Attacks  16
Physical Unclonable Functions-based Linear Encryption agains...
收藏 引用
53rd ACM/EDAC/IEEE Design Automation Conference (DAC)
作者: Qiu, Pengfei Lyu, Yongqiang Zhang, Jiliang Wang, Xingwei Zhai, Di Wang, Dongsheng Qu, Gang Tsinghua Univ Res Inst Informat Technol & TNList Beijing Peoples R China Northeastern Univ Software Coll Dept Informat Secur Shenyang Peoples R China Univ Maryland Elect & Comp Engn Dept College Pk MD 20742 USA Univ Maryland Syst Res Inst College Pk MD 20742 USA
Recently, code reuse attacks (CRAs) have emerged as a new class of ingenious security threatens. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any cod... 详细信息
来源: 评论