搜索结果: 1-4 共查到“军事学 Clone”相关记录4条 . 查询时间(0.046 秒)
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses
RFID based supply chain clone detection authentication
2016/6/15
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentic...
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
SRAM PUF fault injection attack side-channel analysis
2016/1/4
We present a side-channel attack based on remanence decay
in volatile memory and show how it can be exploited effectively to
launch a non-invasive cloning attack against SRAM PUFs — an important
cl...
How to Win the Clone Wars:Efficient Periodic n-Times Anonymous Authentication
Clone Wars Efficient Periodic n-Times Anonymous Authentication
2009/1/6
We create a credential system that lets a user anonymously authenticate at most n times
in a single time period. A user withdraws a dispenser of n e-tokens. She shows an e-token to
a verifier to aut...
Clone Resistant Mutual Authentication for Low-Cost RFID and Contactless Credit Cards
EPC RFID Cloning Mutual Authentication
2008/8/29
With Radio Frequency Identification (RFID) tags being used to secure contactless
credit cards, great benefits but also serious security and information privacy issues have
arisen. Recently many atte...