標(biāo)題: Titlebook: Radio Frequency Identification; 11th International W Stefan Mangard,Patrick Schaumont Conference proceedings 2015 Springer International Pu [打印本頁] 作者: IU421 時間: 2025-3-21 16:56
書目名稱Radio Frequency Identification影響因子(影響力)
書目名稱Radio Frequency Identification影響因子(影響力)學(xué)科排名
書目名稱Radio Frequency Identification網(wǎng)絡(luò)公開度
書目名稱Radio Frequency Identification網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Radio Frequency Identification被引頻次
書目名稱Radio Frequency Identification被引頻次學(xué)科排名
書目名稱Radio Frequency Identification年度引用
書目名稱Radio Frequency Identification年度引用學(xué)科排名
書目名稱Radio Frequency Identification讀者反饋
書目名稱Radio Frequency Identification讀者反饋學(xué)科排名
作者: Banister 時間: 2025-3-21 21:21 作者: Watemelon 時間: 2025-3-22 03:00
Security Evaluation and Enhancement of Bistable Ring PUFsce the security of BR PUFs. Our results show that the XOR BR PUF with more than four parallel BR PUFs is able to resist the ML modeling methods in this work. We also evaluate the other PUF metrics of reliability, uniqueness and uniformity, and find that the XOR function is also effective in improving the uniformity of BR PUFs.作者: 整理 時間: 2025-3-22 04:58 作者: 秘方藥 時間: 2025-3-22 11:24
0302-9743 sions and are organized in topical sections on PUFs andapplications, side-channels and countermeasures, RFID system attacks, andefficient implementations..978-3-319-24836-3978-3-319-24837-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: opalescence 時間: 2025-3-22 14:08
Security Evaluation and Enhancement of Bistable Ring PUFsnsively evaluate its resilience against Machine Learning (ML) modeling attacks. Based on the success of ML attacks, we propose XOR strategies to enhance the security of BR PUFs. Our results show that the XOR BR PUF with more than four parallel BR PUFs is able to resist the ML modeling methods in thi作者: CLAY 時間: 2025-3-22 17:08 作者: 借喻 時間: 2025-3-23 00:15
ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devicesnce of counterfeit (cloned, forged, etc.) goods are two major challenges to address. As a result, owners, manufacturers, distributors, etc. are becoming more interested in approaches that facilitate greater visibility and enable traceability of products as they move through the supply chain. One pro作者: Obloquy 時間: 2025-3-23 03:30
Side-Channel Assisted Modeling Attacks on Feed-Forward Arbiter PUFs Using Silicon Dataever, the majority of PUFs have been shown to be vulnerable to modeling attacks. In this work, we take a closer look at the vulnerability of feed-forward arbiter PUFs towards a combined side-channel and modeling attack using data measured from our 32nm test chips. The side-channel information from t作者: 鼓掌 時間: 2025-3-23 08:46
Sharing is Caring—On the Protection of Arithmetic Logic Units against Passive Physical Attacksd physical access to an embedded device could thus use observation-based attacks like power analysis or chip probing techniques to extract chip-internal secrets. In this work, we investigate how to counteract first-order passive physical attacks on an embedded microcontroller. In particular, we focu作者: CRUC 時間: 2025-3-23 10:14 作者: 連累 時間: 2025-3-23 15:48 作者: 合群 時間: 2025-3-23 20:36 作者: callous 時間: 2025-3-24 00:18 作者: Neutral-Spine 時間: 2025-3-24 02:31 作者: 提名的名單 時間: 2025-3-24 07:46 作者: Infect 時間: 2025-3-24 10:59 作者: 蒸發(fā) 時間: 2025-3-24 18:20
Conference proceedings 2015New York, USA, in June 2015...The 10 revised full papers were carefully reviewed andselected from 23 submissions and are organized in topical sections on PUFs andapplications, side-channels and countermeasures, RFID system attacks, andefficient implementations..作者: 殺菌劑 時間: 2025-3-24 21:51
Sharing is Caring—On the Protection of Arithmetic Logic Units against Passive Physical Attacks from—can be reduced to only one bit per ALU access and clock cycle. The total chip area overhead for implementing the whole microcontroller of our case study as a three-share TI is about a factor of 2.8.作者: impaction 時間: 2025-3-25 02:39 作者: magnanimity 時間: 2025-3-25 03:59
Efficient and Secure Delegation of Group Exponentiation to a Single Serverction, to a . computationally stronger server holding a description of the same function. Solutions need to satisfy natural correctness, security, privacy and efficiency requirements. We obtain delegated computation protocols for the following functions, defined for an . commutative group:作者: Definitive 時間: 2025-3-25 09:24
Conference proceedings 2015New York, USA, in June 2015...The 10 revised full papers were carefully reviewed andselected from 23 submissions and are organized in topical sections on PUFs andapplications, side-channels and countermeasures, RFID system attacks, andefficient implementations..作者: Pelago 時間: 2025-3-25 13:01
978-3-319-24836-3Springer International Publishing Switzerland 2015作者: 果核 時間: 2025-3-25 16:49 作者: Cholecystokinin 時間: 2025-3-25 20:44 作者: 無能力之人 時間: 2025-3-26 02:39
https://doi.org/10.1007/978-3-319-24837-0authentication protocols; block and stream ciphers; cryptography; embedded systems; Internet of Things; I作者: 祖先 時間: 2025-3-26 04:31
Stefan Mangard,Patrick SchaumontIncludes supplementary material: 作者: 不能平靜 時間: 2025-3-26 11:48 作者: arboretum 時間: 2025-3-26 16:26
ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devicesolution specific to network devices (i.e., routers, modems, set-top boxes, video game consoles, home security devices, etc.) that addresses the security and management issues of their entire supply chain. By combining two techniques: one-to-one mapping between tag identity and control chip identity,作者: minimal 時間: 2025-3-26 19:52 作者: 完成才能戰(zhàn)勝 時間: 2025-3-26 21:28
ad, 2003). In an influential paper, Rodrik (1999) warned: ‘Openness to capital inflows can be especially dangerous if appropriate controls, regulatory apparatus and macroeconomic frameworks are not in place.’ (p. 30).. From a theoretical viewpoint, fiscal expansion could worsen the current account b作者: 實(shí)現(xiàn) 時間: 2025-3-27 04:10 作者: GAVEL 時間: 2025-3-27 07:27
Johannes Tobisch,Georg T. Becker FDI when a country becomes more productive. With increased productivity and competitiveness, employment is created and introduction to the world economy is more feasible. New informational technological systems and the decline in global communication costs have made management of foreign investment作者: 燈絲 時間: 2025-3-27 10:13 作者: NICE 時間: 2025-3-27 15:52 作者: Outwit 時間: 2025-3-27 21:09
Raghavan Kumar,Wayne Burlesonchanges on stock market return. It should be noted though that most of these studies have used the conventional market model to calculate the abnormal return in the event study. The sovereign rating literature suggests that rating downgrades generally have a significant impact on the market, while r作者: 表示問 時間: 2025-3-28 00:54
Hannes Grosschanges on stock market return. It should be noted though that most of these studies have used the conventional market model to calculate the abnormal return in the event study. The sovereign rating literature suggests that rating downgrades generally have a significant impact on the market, while r作者: 橢圓 時間: 2025-3-28 03:01 作者: Lipoma 時間: 2025-3-28 08:07
José Vila,Ricardo J. RodríguezH dynamic volatility model of Harvey and Chakravarty (2008) and Harvey (2013a) combined with the autoregressive (AR) model, to specify the conditional volatility and mean of yield spreads. Moreover, we use a Markov regime switching AR model for the yield spread that identifies high- and low-volatili作者: trigger 時間: 2025-3-28 13:16 作者: 發(fā)出眩目光芒 時間: 2025-3-28 18:27
Bren Cavallo,Giovanni Di Crescenzo,Delaram Kahrobaei,Vladimir Shpilrainidge gaps related to financial literacy as well as digital literacy. For instance, user-friendly interactive systems that provide information about the use of mobile phones for payment as well as about financial products and services. In this chapter, we describe such initiatives where intermediatio作者: 可卡 時間: 2025-3-28 19:42 作者: 我悲傷 時間: 2025-3-28 23:35 作者: locus-ceruleus 時間: 2025-3-29 03:42 作者: 河流 時間: 2025-3-29 08:06
René Habraken,Peter Dolron,Erik Poll,Joeri de Ruiter作者: GRIPE 時間: 2025-3-29 13:58
at have been endowed to these countries should be a genuine source of fortune and happiness. Surprisingly, everyday experiences and empirical studies show the reverse (Frankel, 2010). It seems that natural resource abundance is detrimental to economic growth. This puzzling phenomenon is known as the作者: 很是迷惑 時間: 2025-3-29 19:30
c of interest in the empirical literature (see, for example, Bahmani-Oskooee, 1995; Khalid & Guan, 1999; Mohammadi, 2004; Bagnai, 2006; Salvatore, 2006; Bartolini & Lahiri, 2006; Baharumshah & Lau, 2007; Ito, 2009; Daly & Siddiki, 2009). The causal link between public budget deficit and current acco