After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines. In …
F Farha, H Ning, K Ali, L Chen… - IEEE internet of things …, 2020 - ieeexplore.ieee.org
With the development of the cloud-based Internet of Things (IoT), people and things can request services, access data, or control actuators located thousands of miles away. The …
The growth of healthcare technologies has made a great impact on human life for the last few years. Various innovations in implantable and wearable medical devices improve the …
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device …
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the …
After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines. In …
J Pathak, SL Tripathi - Advances in Data and Information Sciences …, 2022 - Springer
Classically, VLSI IC is characterized by area, power, and delay, but the present situation makes security the fourth factor. Whether IC used is an authenticated one or not? Whether IC …
A Bendary, WAS Barbosa, A Pomerance… - Cryptology ePrint …, 2024 - eprint.iacr.org
With the ongoing advances in machine learning (ML), cybersecurity solutions and security primitives are becoming increasingly vulnerable to successful attacks. Strong physically …
Abstract Arbiter PUF and RO-PUF are two well-known architectures. Arbiter PUF is a simple architecture and easy to implement while RO-PUF require exponentially large hardware. As …