Identification and verification using complex, three-dimensional structural features
|
patent
|
June 2003 |
Data processing systems and methods with enhanced bios functionality
|
patent
|
May 2008 |
Reliable generation of a device-specific value
|
patent
|
March 2010 |
Method and system for electronically securing an electronic device using physically unclonable functions
|
patent
|
October 2012 |
Method and system for a secure binding of a revoked X.509 certificate to its corresponding certificate revocation list
|
patent-application
|
June 2002 |
Authentication of integrated circuits
|
patent-application
|
October 2003 |
Securely field configurable device
|
patent-application
|
September 2006 |
Volatile device keys and applications thereof
|
patent-application
|
September 2006 |
Integrated Circuit That Uses a Dynamic Characteristic of the Circuit
|
patent-application
|
October 2006 |
Data Protection and Cryptographic Functions Using a Device-Specific Value
|
patent-application
|
November 2006 |
Reliable Generation of a Device-Specific Value
|
patent-application
|
November 2006 |
Method for protecting information carrier comprising an integrated circuit
|
patent-application
|
February 2007 |
Method and system for authentication of a physical object
|
patent-application
|
February 2007 |
Information carrier comprising a non-clonable optical identifier
|
patent-application
|
June 2007 |
Controlling Access to Device-Specific Information
|
patent-application
|
August 2007 |
System and Method of Reliable Foward Secret Key Sharing with Physical Random Functions
|
patent-application
|
February 2008 |
Sharing a secret by using random function
|
patent-application
|
March 2008 |
Method, Apparatus, Device, System, Program, for Calibrating
|
patent-application
|
June 2008 |
Integrated Physical Unclonable Function (Puf) with Combined Sensor and Display
|
patent-application
|
September 2008 |
Authentication with Physical Unclonable Functions
|
patent-application
|
March 2009 |
Volatile Device Keys And Applications Thereof
|
patent-application
|
October 2009 |
Temperature-Profiled Device Fingerprint Generation and Authentication from Power-Up States of Static Cells
|
patent-application
|
December 2009 |
Information Security Apparatus
|
patent-application
|
February 2010 |
Fingerprint Sensor Device and System with Verification Token and Methods of Using
|
patent-application
|
April 2010 |
Non-Network RFID Authentication
|
patent-application
|
May 2010 |
Device and Method for Providing Authentication
|
patent-application
|
July 2010 |
Securely Field Configurable Device
|
patent-application
|
October 2010 |
Method and System for Electronically Securing an Electronic Biometric Device Using Physically Unclonable Functions
|
patent-application
|
January 2011 |
Lightweight Secure Physically Unclonable Functions
|
patent-application
|
March 2011 |
Combination of Values from a Pseudo-Random Source
|
patent-application
|
March 2011 |
Authenticating A Device and A User
|
patent-application
|
August 2011 |
Device and Method for Obtaining a Cryptographic Key
|
patent-application
|
February 2013 |
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
|
journal
|
October 2008 |
Remote patient monitoring: Information reliability challenges
- Petkovic, Milan
-
TELSIKS 2009 - 2009 9th International Conference on Telecommunications in Modern Satellite, Cable, and Broadcasting Services, 2009 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services
https://doi.org/10.1109/TELSKS.2009.5339520
|
conference
|
October 2009 |
Physical Unclonable Functions and Their Applications to Vehicle System Security
|
conference
|
April 2009 |
Hardware intrinsic security from D flip-flops
|
conference
|
January 2010 |
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
|
book
|
January 2004 |
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method
|
conference
|
December 2006 |
Combining Crypto with Biometrics Effectively
|
journal
|
September 2006 |
A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations
|
journal
|
January 2008 |
A technique to build a secret key in integrated circuits for identification and authentication applications
|
conference
|
January 2004 |
Energy Scalable Universal Hashing
|
journal
|
December 2005 |
Extended abstract: The butterfly PUF protecting IP on every FPGA
|
conference
|
June 2008 |
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
|
journal
|
January 2008 |
LFSR-based Hashing and Authentication
|
conference
|
January 1994 |
Physical unclonable functions for device authentication and secret key generation
|
conference
|
January 2007 |
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
|
conference
|
August 2007 |
Protecting bus-based hardware IP by secret sharing
|
conference
|
January 2008 |