{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:05:51Z","timestamp":1762272351415,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/giis.2018.8635789","type":"proceedings-article","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T23:55:53Z","timestamp":1549583753000},"page":"1-5","source":"Crossref","is-referenced-by-count":15,"title":["Securing IoT Devices Using Robust DRAM PUFs"],"prefix":"10.1109","author":[{"given":"Nikolaos Athanasios","family":"Anagnostopoulos","sequence":"first","affiliation":[]},{"given":"Tolga","family":"Arul","sequence":"additional","affiliation":[]},{"given":"Yufan","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hatzfeld","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Lotichius","sequence":"additional","affiliation":[]},{"given":"Ratika","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Felipe","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Fatemeh","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00013"},{"key":"ref11","first-page":"1","article-title":"Decay-Based DRAM PUFs in Commodity Devices","author":"schaller","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951729"},{"key":"ref13","first-page":"547","article-title":"Etude Comparative de la Distribution Florale dans une&#x00B4; Portion des Alpes et du Jura","volume":"37","author":"jaccard","year":"1901","journal-title":"Bulletin de la Socit Vaudoise des Sciences Naturelles"},{"key":"ref14","article-title":"Applications Of Physical Unclonable Functions on ASICS and FPGAs","author":"usmani","year":"2018","journal-title":"Master&#x2019;s thesis University of Massachusetts Amherst Amherst Massachusetts U S A"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2016.7870046"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/cryptography2030013","article-title":"Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security","volume":"2","author":"anagnostopoulos","year":"2018","journal-title":"Cryptography"},{"key":"ref6","first-page":"71","article-title":"Exploring Methods of Authentication for the Internet of Things","author":"chandy","year":"2017","journal-title":"in Internet of Things Chapman and Hall\/CRC"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2899007.2899013","article-title":"Position Paper: Physical Unclonable Functions for IoT Security","author":"aman","year":"2016","journal-title":"in Proceedings of the 2nd ACM International Workshop on IoT Privacy Trust and Security ser IoTPTS &#x2019;16 New York NY USA ACM"},{"key":"ref8","article-title":"Investigation of the Internet of Things in its Application to Lowcost Authentication within Healthcare","author":"tehranipoor","year":"2017","journal-title":"in IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)"},{"key":"ref7","first-page":"1","article-title":"LowCost Authentication Paradigm for Consumer Electronics Within the Internet of Wearable Fitness Tracking Applications","author":"tehranipoor","year":"0","journal-title":"in 2018 IEEE International Conference on Consumer Electronics (ICCE)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-662-53140-2_21","article-title":"Run-Time Accessible DRAM PUFs in Commodity Devices","author":"xiong","year":"2016","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2016"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.3390\/cryptography2020007","article-title":"An Overview of DRAM-Based Security Primitives","volume":"2","author":"anagnostopoulos","year":"2018","journal-title":"Cryptography"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2973748"}],"event":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","start":{"date-parts":[[2018,10,23]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 Global Information Infrastructure and Networking Symposium (GIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8632667\/8635591\/08635789.pdf?arnumber=8635789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:24:33Z","timestamp":1643235873000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8635789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/giis.2018.8635789","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}