搜索结果: 1-8 共查到“军事学 supply”相关记录8条 . 查询时间(0.043 秒)
Weak-Unforgeable Tags for Secure Supply Chain Management
light-weight cryptography unforgeability One-time Hash function
2017/12/25
Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al. (HOST 2017) propose a new management scheme based on RFID tags (with ...
System Clock and Power Supply Cross-Checking for Glitch Detection
System Clock Power Supply Cross-Checking
2016/12/8
Cryptographic systems are vulnerable to different kinds of fault injection attacks. System clock glitch is one of the most widely used fault injection methods used in different attacks. In this paper,...
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality
virtual proof of reality physical unclonable function PUF
2016/1/26
A new security protocol of virtual proof of reality (VP) is recently
proposed by Ruhrmair et al. The VP allows one party, the prover,
making a physical statement to the other party, the verifier, ov...
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply
Deconvolution Detrending Wavelets
2015/12/30
In this paper we detail techniques that can be used to analyze
and attack an AES implementation on an FPGA from the primary
(i.e., external) side of a switched-mode power supply. Our attack only
re...
We investigate an application of Radio Frequency Identification (RFID) referred to in the literature as group scanning, in which an RFID reader device interrogates several RFID tags to establish “simu...
Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for coun...
Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for coun...
Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for coun...