Abstract is missing.
- Physical unclonable functions: devices for cryptostorageDominik Merli, Rainer Plaga. 1-2 [doi]
- Machine code verification of a tiny ARM hypervisorMads Dam, Roberto Guanciale, Hamed Nemati. 3-12 [doi]
- Bias-based modeling and entropy analysis of PUFsRobbert van den Berg, Boris Skoric, Vincent van der Leest. 13-20 [doi]
- Efficient hardware implementation of the stream cipher WG-16 with composite field arithmeticXinxin Fan, Nusa Zidaric, Mark Aagaard, Guang Gong. 21-34 [doi]
- Securing implantable cardiac medical devices: use of radio frequency energy harvestingNourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga. 35-42 [doi]
- Breaking through fixed PUF block limitations with differential sequence coding and convolutional codesMatthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner, Georg Sigl. 43-54 [doi]
- Secure PRNG seeding on commercial off-the-shelf microcontrollersAnthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede. 55-64 [doi]
- Securing data provenance in body area networks using lightweight wireless link fingerprintsSyed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay Jha. 65-72 [doi]
- Feasibly clonable functionsChristian Boit, Clemens Helfmeier, Dmitry Nedospasov. 73-74 [doi]