Hardware Security and Authentication Techniques leaf node


URI

https://openalex.org/T12122

Label

Hardware Security and Authentication Techniques

Description

This cluster of papers focuses on hardware security and authentication techniques, including the use of Physical Unclonable Functions (PUFs) for device authentication and key generation, detection and prevention of Hardware Trojans, logic encryption methods, FPGA security, anti-counterfeiting measures, IC reverse engineering, scan-based side-channel attacks, machine learning attacks on hardware, and obfuscation techniques to protect integrated circuits.

Implementation

@prefix oasubfields: <https://openalex.org/subfields/> .
@prefix openalex: <https://lambdamusic.github.io/openalex-hacks/ontology/> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix skos: <http://www.w3.org/2004/02/skos/core#> .
@prefix xsd: <http://www.w3.org/2001/XMLSchema#> .

<https://openalex.org/T12122> a skos:Concept ;
    rdfs:label "Hardware Security and Authentication Techniques"@en ;
    rdfs:isDefinedBy openalex: ;
    owl:sameAs <https://en.wikipedia.org/wiki/Hardware_security>,
        <https://openalex.org/T12122> ;
    skos:broader oasubfields:1708 ;
    skos:definition "This cluster of papers focuses on hardware security and authentication techniques, including the use of Physical Unclonable Functions (PUFs) for device authentication and key generation, detection and prevention of Hardware Trojans, logic encryption methods, FPGA security, anti-counterfeiting measures, IC reverse engineering, scan-based side-channel attacks, machine learning attacks on hardware, and obfuscation techniques to protect integrated circuits."@en ;
    skos:inScheme openalex: ;
    skos:prefLabel "Hardware Security and Authentication Techniques"@en ;
    openalex:cited_by_count 183967 ;
    openalex:works_count 14468 .