Author of the publication

License Distribution Protocols from Optical Media Fingerprints.

, , and . Towards Hardware-Intrinsic Security, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PUF-HB: A Tamper-Resilient HB Based Authentication Protocol., and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 346-365. (2008)Bandwidth Efficient PIR from NTRU., , and . Financial Cryptography Workshops, volume 8438 of Lecture Notes in Computer Science, page 195-207. Springer, (2014)Non-linear Error Detection for Finite State Machines., , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 226-238. Springer, (2009)Physical unclonable function with tristate buffers., , and . ISCAS, page 3194-3197. IEEE, (2008)Novel PUF-Based Error Detection Methods in Finite State Machines., , and . ICISC, volume 5461 of Lecture Notes in Computer Science, page 235-252. Springer, (2008)Towards Robust Low Cost Authentication for Pervasive Devices., , and . PerCom, page 170-178. IEEE Computer Society, (2008)CDs Have Fingerprints Too., , and . CHES, volume 5747 of Lecture Notes in Computer Science, page 348-362. Springer, (2009)A tamper-proof and lightweight authentication scheme., , and . Pervasive Mob. Comput., 4 (6): 807-818 (2008)A fast real-time memory authentication protocol., , and . STC, page 31-40. ACM, (2008)Unclonable Lightweight Authentication Scheme., , , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 33-48. Springer, (2008)