A Formal Definition and a New Security Mechanism of Physical Unclonable Functions (English)
- New search for: Plaga, R.
- New search for: Koob, F.
- New search for: Plaga, R.
- New search for: Koob, F.
- New search for: Schmitt, Jens Burkhard
In:
GI/ITG Conference on Measuring, Modelling, and Evaluating Computing, and Communication Systems; dependability and fault tolerance: GI/ITG Conference, MMB & DFT 2012
7201
;
288-301
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:A Formal Definition and a New Security Mechanism of Physical Unclonable Functions
-
Contributors:
-
Conference:16th, GI/ITG Conference on Measuring, Modelling, and Evaluating Computing, and Communication Systems; dependability and fault tolerance: GI/ITG Conference, MMB & DFT 2012 ; 2012 ; Kaiserslautern, Germany
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE , 7201 ; 288-301
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2012-01-01
-
Size:14 pages
-
Remarks:Includes bibliographical references and index. Also issued online. MMB & DFT 2012.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Availability in Large Networks: Global Characteristics from Local Unreliability PropertiesDaduna, H. / Saul, L.P. et al. | 2012
- 16
-
Stochastic Analysis of a Finite Source Retrial Queue with Spares and Orbit SearchZhang, F. / Wang, J. et al. | 2012
- 31
-
Bounds for Two-Terminal Network Reliability with Dependent Basic EventsLe, M. / Walter, M. et al. | 2012
- 46
-
Software Reliability Testing Covering Subsystem InteractionsMeitner, M. / Saglietti, F. et al. | 2012
- 61
-
Failure-Dependent Timing Analysis - A New Methodology for Probabilistic Worst-Case Execution Time AnalysisHofig, K. et al. | 2012
- 76
-
A Calculus for SLA Delay PropertiesVastag, S. et al. | 2012
- 91
-
Verifying Worst Case Delays in Controller Area NetworkIvkovic, N. / Kresic, D. / Hielscher, K.-S. / German, R. et al. | 2012
- 106
-
Lifetime Improvement by Battery SchedulingJongerden, M.R. / Haverkort, B.R. et al. | 2012
- 121
-
Weighted Probabilistic Equivalence Preserves omega -Regular PropertiesSharma, A. et al. | 2012
- 136
-
Probabilistic CSP: Preserving the Laws via Restricted SchedulersGeorgievska, S. / Andova, S. et al. | 2012
- 151
-
Heuristics for Probabilistic Timed Automata with Abstraction RefinementFioriti, L.M.F. / Hermanns, H. et al. | 2012
- 166
-
Simulative and Analytical Evaluation for ASD-Based Embedded SoftwareSadre, R. / Remke, A. / Hettinga, S. / Haverkort, B. et al. | 2012
- 182
-
Reducing Channel Zapping Delay in WiMAX-Based IPTV SystemsAbdollahpouri, A. / Wolfinger, B.E. et al. | 2012
- 197
-
Performance Evaluation of 10GE NICs with SR-IOV Support: I/O Virtualization and Network Stack OptimizationsHuang, S. / Baldine, I. et al. | 2012
- 206
-
Business Driven BCM SLA Translation for Service Oriented SystemsWinkler, U. / Gilani, W. / Marshall, A. et al. | 2012
- 221
-
Boosting Design Space Explorations with Existing or Automatically Learned KnowledgeJahr, R. / Calborean, H. / Vintan, L. / Ungerer, T. et al. | 2012
- 236
-
IBPM: An Open-Source-Based Framework for InifiniBand Performance MonitoringHoefling, M. / Menth, M. / Kniep, C. / Camen, M. et al. | 2012
- 240
-
A Workbench for Internet Traffic AnalysisEittenberger, P.M. / Krieger, U.R. et al. | 2012
- 244
-
A Modelling and Analysis Environment for LARESGouberman, A. / Riedl, M. / Schuster, J. / Siegle, M. et al. | 2012
- 249
-
Simulation and Statistical Model Checking for Modestly Nondeterministic ModelsBogdoll, J. / Hartmanns, A. / Hermanns, H. et al. | 2012
- 253
-
UniLoG: A Unified Load Generation ToolKolesnikov, A. et al. | 2012
- 258
-
Non Preemptive Static Priority with Network Calculus: EnhancementSofack, W.M. / Boyer, M. et al. | 2012
- 273
-
A Demand-Response Calculus with Perfect BatteriesLe Boudec, J.-Y. / Tomozei, D.-C. et al. | 2012
- 288
-
A Formal Definition and a New Security Mechanism of Physical Unclonable FunctionsPlaga, R. / Koob, F. et al. | 2012
- 302
-
Modeling and Analysis of a P2P-VoD System Based on Stochastic Network CalculusWang, K. / Jiang, Y. / Lin, C. et al. | 2012
- 317
-
Using NFC Phones for Proving CredentialsAlpar, G. / Batina, L. / Verdult, R. et al. | 2012