39 results on '"Martin, Honorio"'
Search Results
2. Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
3. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures
4. SRAM-Based PUF Readouts
5. Challenging the security of “A PUF-based hardware mutual authentication protocol”
6. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures
7. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
8. Using Approximate Circuits Against Hardware Trojans
9. Using a Privacy-Enhanced Authentication Processto Secure IoT-based Smart Grid Infrastructures
10. PIONEER—a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag
11. Analyzing Scaled Reduced Precision Redundancy for Error Mitigation Under Proton Irradiation
12. Evaluating Reduced Resolution Redundancy for Radiation Hardening in FPGA Designs
13. Clasificación de las fracturas toracolumbares: comparación entre las clasificaciones de AO y Vaccaro Classificação das fraturas toracolombares: comparação entre as classificações de AO e Vaccaro Classification of thoracolumbar fractures: a comparison between the classifications of AO versus Vaccaro
14. Analyzing Reduced Precision Triple Modular Redundancy Under Proton Irradiation
15. Reduced Resolution Redundancy: A Novel Approximate Error Mitigation Technique
16. SRAM-PUF: Platform for Acquisition of Sram-Based Pufs from Micro-Controllers
17. Identification of Hardware Devices based on Sensors and Switching Activity: a Preliminary Study
18. Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
19. A True Random Number Generator Based on Gait Data for the Internet of You
20. Enhancing PUF based challenge-response sets by exploiting various background noise configurations
21. On the Reliability of the Ring Oscillator Physically Unclonable Functions
22. Enhancing PUF Based Challenge–Response Sets by Exploiting Various Background Noise Configurations
23. Hardware Trojans against virtual keyboards on e-banking platforms – A proof of concept
24. On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation
25. Total Ionizing Dose Effects on a Delay-Based Physical Unclonable Function Implemented in FPGAs
26. On the entropy of oscillator-based true random number generators under ionizing radiation
27. Total Ionizing Dose Effects on a Delay-Based Physical Unclonable Function Implemented in FPGAs
28. On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation
29. Towards a Dependable True Random Number Generator With Self-Repair Capabilities
30. A Self-Repairable TRNG
31. A lightweight implementation of the Tav-128 hash function
32. Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness
33. A New TRNG based on Coherent Sampling with Self-timed Rings
34. An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms
35. Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols
36. A New TRNG Based on Coherent Sampling With Self-Timed Rings.
37. AKARI-X: A pseudorandom number generator for secure lightweight systems
38. Clasificación de las fracturas toracolumbares: comparación entre las clasificaciones de AO y Vaccaro
39. On the entropy of oscillator-based true random number generators under ionizing radiation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.