Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Lieneke Kusters"'
Autor:
Lieneke Kusters, Frans M. J. Willems
Publikováno v:
Entropy, Vol 23, Iss 5, p 590 (2021)
We present a new Multiple-Observations (MO) helper data scheme for secret-key binding to an SRAM-PUF. This MO scheme binds a single key to multiple enrollment observations of the SRAM-PUF. Performance is improved in comparison to classic schemes whic
Externí odkaz:
https://doaj.org/article/54d793eac71d4558848040e46cb479e4
Autor:
Rui Wang, Lieneke Kusters, Roel Maes, Frans M. J. Willems, Geert-Jan Schrijen, G. Selimis, Stefan Ilić, Mario Münzer
Publikováno v:
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020, 1-10
STARTPAGE=1;ENDPAGE=10;TITLE=Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020
ARES
STARTPAGE=1;ENDPAGE=10;TITLE=Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020
ARES
We present RESCURE, a security solution built on software, which retrofits Internet of Things (IoT) devices to secure ones. RESCURE exploits the entropy originating from the random variations of silicon (transistors) during manufacturing and generate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cd92e036a07ccce2f3594e4cca340acc
http://www.scopus.com/inward/record.url?scp=85090341607&partnerID=8YFLogxK
http://www.scopus.com/inward/record.url?scp=85090341607&partnerID=8YFLogxK
Publikováno v:
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 343-345
STARTPAGE=343;ENDPAGE=345;TITLE=WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
STARTPAGE=343;ENDPAGE=345;TITLE=WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Low-cost interconnected devices, so-called Internet-of-Things (IoT), commonly have no dedicated or posses insufficient hardware security features. This is challenging, as IoT devices are becoming an integral part of critical infrastructures providing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::252614e0199472625d0148bc3c40e357
https://research.tue.nl/nl/publications/3d7b1e92-d5f6-42d5-980a-fda32d444705
https://research.tue.nl/nl/publications/3d7b1e92-d5f6-42d5-980a-fda32d444705
Publikováno v:
2020 IEEE Conference on Communications and Network Security, CNS 2020
CNS
CNS
We use a statistical model for SRAM PUFs to study achievable performance of secret-key binding schemes in terms of secret-key capacity. We show that capacity increases when the temperature dependent behavior of individual SRAM cells is observed durin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0dc7109c6dd0da4ed8294769131b6442
http://www.scopus.com/inward/record.url?scp=85090125673&partnerID=8YFLogxK
http://www.scopus.com/inward/record.url?scp=85090125673&partnerID=8YFLogxK
Autor:
Frans M. J. Willems, Lieneke Kusters
Publikováno v:
2019 IEEE International Workshop on Information Forensics and Security, WIFS 2019
WIFS
WIFS
Fuzzy commitment is used to bind a secret key to an SRAM-PUF observation vector. The fuzzy commitment scheme is secure as long as the observation vector has full entropy. Here, we assume that the observation vectors are biased, and explore two elemen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b45e3b54eb7bc20b4b6a827d09a0282b
https://research.tue.nl/en/publications/e153aec1-dbc8-4a82-992b-b83cb1567c39
https://research.tue.nl/en/publications/e153aec1-dbc8-4a82-992b-b83cb1567c39
Autor:
Lieneke Kusters, Frans M. J. Willems
Publikováno v:
ISIT
2018 IEEE International Symposium on Information Theory, ISIT 2018, 2624-2628
STARTPAGE=2624;ENDPAGE=2628;TITLE=2018 IEEE International Symposium on Information Theory, ISIT 2018
2018 IEEE International Symposium on Information Theory, ISIT 2018, 2624-2628
STARTPAGE=2624;ENDPAGE=2628;TITLE=2018 IEEE International Symposium on Information Theory, ISIT 2018
We use an SRAM Physical Unclonable Function (PUF) to generate secret keys for authentication purposes. During enrollment, an encoder generates a secret key and corresponding helper data based on an SRAM-PUF observation vector. Later, the device ident
Autor:
Arash Pourtaherian, Harm J. Scholten, Lieneke Kusters, Svitlana Zinger, Nenad Mihajlovic, Alexander F. Kolen, Fei Zuo, Gary C. Ng, Hendrikus H. M. Korsten, Peter H. N. de With
Publikováno v:
IEEE Transactions on Medical Imaging, 36(8):7894219, 1664-1675. Institute of Electrical and Electronics Engineers
Ultrasound-guided medical interventions are broadly applied in diagnostics and therapy, e.g., regional anesthesia or ablation. A guided intervention using 2-D ultrasound is challenging due to the poor instrument visibility, limited field of view, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::69f8c2bd955b927a8421960ac7855ffd
https://research.tue.nl/nl/publications/26fd13b4-bb19-42cc-8041-42512b27ef08
https://research.tue.nl/nl/publications/26fd13b4-bb19-42cc-8041-42512b27ef08
Autor:
G. Selimis, Roel Maes, Frans M. J. Willems, Tanya Ignatenko, Erik van der Sluis, Lieneke Kusters
Publikováno v:
ISIT
Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), 25-30 June 2017, Aachen, Germany, 1803-1807
STARTPAGE=1803;ENDPAGE=1807;TITLE=Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), 25-30 June 2017, Aachen, Germany
Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), 25-30 June 2017, Aachen, Germany, 1803-1807
STARTPAGE=1803;ENDPAGE=1807;TITLE=Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), 25-30 June 2017, Aachen, Germany
Fuzzy commitment and syndrome-based schemes are two well-known helper data schemes used to bind and generate, respectively, a secret key to/from SRAM-PUF observations. To allow the decoder to reconstruct this secret key from a new (verification) obse
Autor:
Jacopo Viti, Francesco Guidi, Libertario Demi, Piero Tortoli, Lieneke Kusters, Massimo Mischi
Publikováno v:
IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control
IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, 60(11), 2310-2320. Institute of Electrical and Electronics Engineers
IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, 60(11), 2310-2320. Institute of Electrical and Electronics Engineers
The speed of sound in the human body limits the achievable data acquisition rate of pulsed ultrasound scanners. To overcome this limitation, parallel beamforming techniques are used in ultrasound 2-D and 3-D imaging systems. Different parallel beamfo
Autor:
Massimo Mischi, Jacopo Viti, Piero Tortoli, Francesco Guidi, Libertario Demi, Lieneke Kusters
Publikováno v:
Proceedings of the 2013 IEEE International Ultrasonics Symposium (IUS), 21-25 July 2013, Prague, Czech Republic, 1468-1471
STARTPAGE=1468;ENDPAGE=1471;TITLE=Proceedings of the 2013 IEEE International Ultrasonics Symposium (IUS), 21-25 July 2013, Prague, Czech Republic
STARTPAGE=1468;ENDPAGE=1471;TITLE=Proceedings of the 2013 IEEE International Ultrasonics Symposium (IUS), 21-25 July 2013, Prague, Czech Republic
Parallel receive beam forming is not optimal for harmonic imaging, as employing a wide beam or plane wave in transmission results in the generation of lower absolute pressure values, when compared to focused ultrasound beams, and conflicts with the d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e1ceeba17ca007a41a5d4b83a61619d1
https://doi.org/10.1109/ultsym.2013.0372
https://doi.org/10.1109/ultsym.2013.0372