IEEE Organizations related to Secure Coding (counterfeiting Avoidance)

Back to Top


Conferences related to Secure Coding (counterfeiting Avoidance)

Back to Top

No conferences are currently tagged "Secure Coding (counterfeiting Avoidance)"


Periodicals related to Secure Coding (counterfeiting Avoidance)

Back to Top

Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...



Most published Xplore authors for Secure Coding (counterfeiting Avoidance)

Back to Top

Xplore Articles related to Secure Coding (counterfeiting Avoidance)

Back to Top

14.2 A physically unclonable function with BER <10−8 for robust chip authentication using oscillator collapse in 40nm CMOS

2015 IEEE International Solid-State Circuits Conference - (ISSCC) Digest of Technical Papers, 2015

Security is a key concern in today's mobile devices and a number of hardware implementations of security primitives have been proposed, including true random number generators, differential power attack avoidance, and chip-ID generators [1-4]. Recently, physically unclonable functions (PUFs) were proposed as a secure method for chip authentication in unsecure environments [5-7]. A PUF is a function that maps an ...



Educational Resources on Secure Coding (counterfeiting Avoidance)

Back to Top

IEEE-USA E-Books

  • 14.2 A physically unclonable function with BER <10−8 for robust chip authentication using oscillator collapse in 40nm CMOS

    Security is a key concern in today's mobile devices and a number of hardware implementations of security primitives have been proposed, including true random number generators, differential power attack avoidance, and chip-ID generators [1-4]. Recently, physically unclonable functions (PUFs) were proposed as a secure method for chip authentication in unsecure environments [5-7]. A PUF is a function that maps an input code ("challenge') to an output code (“response”) in a manner that is unique for every chip. PUFs are increasingly used for IC authentication to offer protection against identity theft, cloning, and counterfeit components [2-4].



Standards related to Secure Coding (counterfeiting Avoidance)

Back to Top

No standards are currently tagged "Secure Coding (counterfeiting Avoidance)"


Jobs related to Secure Coding (counterfeiting Avoidance)

Back to Top