↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A New Approach to χ 2 Cryptanalysis of Block Ciphers
  3. Altmetric Badge
    Chapter 2 Analysis and Optimization of Cryptographically Generated Addresses
  4. Altmetric Badge
    Chapter 3 Security Analysis of the PACE Key-Agreement Protocol
  5. Altmetric Badge
    Chapter 4 Towards Security Notions for White-Box Cryptography
  6. Altmetric Badge
    Chapter 5 A Calculus to Detect Guessing Attacks
  7. Altmetric Badge
    Chapter 6 Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
  8. Altmetric Badge
    Chapter 7 Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
  9. Altmetric Badge
    Chapter 8 On Free-Start Collisions and Collisions for TIB3
  10. Altmetric Badge
    Chapter 9 Detection of Database Intrusion Using a Two-Stage Fuzzy System
  11. Altmetric Badge
    Chapter 10 Combining Consistency and Confidentiality Requirements in First-Order Databases
  12. Altmetric Badge
    Chapter 11 Cancelable Iris Biometrics Using Block Re-mapping and Image Warping
  13. Altmetric Badge
    Chapter 12 Iris Recognition in Nonideal Situations
  14. Altmetric Badge
    Chapter 13 Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
  15. Altmetric Badge
    Chapter 14 Practical Algebraic Attacks on the Hitag2 Stream Cipher
  16. Altmetric Badge
    Chapter 15 A New Construction of Boolean Functions with Maximum Algebraic Immunity
  17. Altmetric Badge
    Chapter 16 A2M: Access-Assured Mobile Desktop Computing
  18. Altmetric Badge
    Chapter 17 Automated Spyware Collection and Analysis
  19. Altmetric Badge
    Chapter 18 Towards Unifying Vulnerability Information for Attack Graph Construction
  20. Altmetric Badge
    Chapter 19 Traitor Tracing without A Priori Bound on the Coalition Size
  21. Altmetric Badge
    Chapter 20 SISR – A New Model for Epidemic Spreading of Electronic Threats
  22. Altmetric Badge
    Chapter 21 An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
  23. Altmetric Badge
    Chapter 22 Robust Authentication Using Physically Unclonable Functions
  24. Altmetric Badge
    Chapter 23 Risks of the CardSpace Protocol
  25. Altmetric Badge
    Chapter 24 Fair E-Cash: Be Compact, Spend Faster
  26. Altmetric Badge
    Chapter 25 On the Security of Identity Based Ring Signcryption Schemes
  27. Altmetric Badge
    Chapter 26 A Storage Efficient Redactable Signature in the Standard Model
  28. Altmetric Badge
    Chapter 27 Generic Construction of Stateful Identity Based Encryption
  29. Altmetric Badge
    Chapter 28 Privacy-Aware Attribute-Based Encryption with User Accountability
  30. Altmetric Badge
    Chapter 29 Hardware-Assisted Application-Level Access Control
  31. Altmetric Badge
    Chapter 30 Towards Trustworthy Delegation in Role-Based Access Control Model
  32. Altmetric Badge
    Chapter 31 Secure Interoperation in Multidomain Environments Employing UCON Policies
  33. Altmetric Badge
    Chapter 32 Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control
  34. Altmetric Badge
    Chapter 33 Nonce Generators and the Nonce Reset Problem
  35. Altmetric Badge
    Chapter 34 MAC Precomputation with Applications to Secure Memory
  36. Altmetric Badge
    Chapter 35 HMAC without the “Second” Key
  37. Altmetric Badge
    Chapter 36 Adding Trust to P2P Distribution of Paid Content
  38. Altmetric Badge
    Chapter 37 Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
  39. Altmetric Badge
    Chapter 38 F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
Attention for Chapter 22: Robust Authentication Using Physically Unclonable Functions
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
66 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Robust Authentication Using Physically Unclonable Functions
Chapter number 22
Book title
Information Security
Published by
Springer Berlin Heidelberg, January 2009
DOI 10.1007/978-3-642-04474-8_22
Book ISBNs
978-3-64-204473-1, 978-3-64-204474-8
Authors

Keith B. Frikken, Marina Blanton, Mikhail J. Atallah, Frikken, Keith B., Blanton, Marina, Atallah, Mikhail J.

Editors

Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 66 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 2 3%
Japan 1 2%
Brazil 1 2%
Unknown 62 94%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 25 38%
Student > Master 12 18%
Researcher 9 14%
Lecturer 5 8%
Student > Bachelor 2 3%
Other 8 12%
Unknown 5 8%
Readers by discipline Count As %
Computer Science 42 64%
Engineering 11 17%
Agricultural and Biological Sciences 1 2%
Psychology 1 2%
Business, Management and Accounting 1 2%
Other 4 6%
Unknown 6 9%