Articles with "security key" as a keyword



Photo by scottwebb from unsplash

A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2868824

Abstract: Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained… read more here.

Keywords: sram puf; security key; key generation;
Photo from wikipedia

Loki: A Physical Security Key Compatible IoT Based Lock for Protecting Physical Assets

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3216665

Abstract: The twenty first century has witnessed an enormous rise in data produced per person and it has also witnessed newer and advanced forms of digital attacks and instinctively, witnessed a rise in the need for… read more here.

Keywords: lock; physical security; security; loki physical ... See more keywords