Turning Lemons into Lemonade: Employing Process Variation for Building Chip Identifiers - Dr. Leyla Nazhandali from unique identifiers in access Watch Video
Preview(s):
Gallery
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)
⏲ Duration: 31 min 80 sec ✓ Published: 21-Feb-2011
Description: February 18th, 2011nnAbstractnnThe ability to establish, in a secure and unique way, the identity of an object has a rich and broad set of applications in pervasive security, for example in Radio-Frequency Identifiers (RFID) for secure access, secure authentication of unattended communication systems, anti-piracy protection of software, and anti-counterfeiting of government-issued documents. Silicon Physical Unclonable Functions (PUF) provide a low-cost solution for secure identification and aut
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)