{"id":"https://openalex.org/W3008711827","doi":"https://doi.org/10.1109/asianhost47458.2019.9006716","title":"Locking Secret Data in the Vault Leveraging Fuzzy PUFs","display_name":"Locking Secret Data in the Vault Leveraging Fuzzy PUFs","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3008711827","doi":"https://doi.org/10.1109/asianhost47458.2019.9006716","mag":"3008711827"},"language":"en","primary_location":{"id":"doi:10.1109/asianhost47458.2019.9006716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost47458.2019.9006716","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109451594","display_name":"Paul Chin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Paul Chin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051407732","display_name":"Yuan Cao","orcid":"https://orcid.org/0000-0001-5227-2241"},"institutions":[{"id":"https://openalex.org/I163340411","display_name":"Hohai University","ror":"https://ror.org/01wd4xt90","country_code":"CN","type":"education","lineage":["https://openalex.org/I163340411"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Cao","raw_affiliation_strings":["Hohai University, Chang Zhou, China"],"affiliations":[{"raw_affiliation_string":"Hohai University, Chang Zhou, China","institution_ids":["https://openalex.org/I163340411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065818226","display_name":"Xiaojin Zhao","orcid":"https://orcid.org/0000-0002-9965-3516"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaojin Zhao","raw_affiliation_strings":["College of Electronics and Information Engineering, Shen Zhen University, Shen Zhen, China"],"affiliations":[{"raw_affiliation_string":"College of Electronics and Information Engineering, Shen Zhen University, Shen Zhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100769152","display_name":"Leilei Zhang","orcid":"https://orcid.org/0000-0002-5296-8430"},"institutions":[{"id":"https://openalex.org/I4210155232","display_name":"Fiberhome Technology Group (China)","ror":"https://ror.org/04yv20134","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210155232"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leilei Zhang","raw_affiliation_strings":["Fiberhome Telecommunication Technologies Co. Ltd, Wu Han, China"],"affiliations":[{"raw_affiliation_string":"Fiberhome Telecommunication Technologies Co. Ltd, Wu Han, China","institution_ids":["https://openalex.org/I4210155232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100403380","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-6087-8243"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["College of Information Science & Electronic Engineering, Zhejiang University, Hang Zhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science & Electronic Engineering, Zhejiang University, Hang Zhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5109451594"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.21406209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6819","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7830228805541992},{"id":"https://openalex.org/keywords/dram","display_name":"Dram","score":0.5581706166267395},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5477069616317749},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5470144152641296},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4940502941608429},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.489702969789505},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4729749262332916},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.43053334951400757},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.39186471700668335},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34778347611427307},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3362801969051361},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31922125816345215},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28397446870803833},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20544558763504028},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.16375303268432617}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7830228805541992},{"id":"https://openalex.org/C7366592","wikidata":"https://www.wikidata.org/wiki/Q1255620","display_name":"Dram","level":2,"score":0.5581706166267395},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5477069616317749},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5470144152641296},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4940502941608429},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.489702969789505},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4729749262332916},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.43053334951400757},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.39186471700668335},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34778347611427307},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3362801969051361},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31922125816345215},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28397446870803833},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20544558763504028},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.16375303268432617},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asianhost47458.2019.9006716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost47458.2019.9006716","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W140789737","https://openalex.org/W383543526","https://openalex.org/W1582233190","https://openalex.org/W1878763544","https://openalex.org/W1981487090","https://openalex.org/W2000947714","https://openalex.org/W2015619456","https://openalex.org/W2033300150","https://openalex.org/W2052828598","https://openalex.org/W2106137793","https://openalex.org/W2144596760","https://openalex.org/W2146813141","https://openalex.org/W2159464108","https://openalex.org/W2165831888","https://openalex.org/W2171425369","https://openalex.org/W2500740922","https://openalex.org/W2570008916","https://openalex.org/W2794842046","https://openalex.org/W2796159762","https://openalex.org/W2947761168","https://openalex.org/W2982321631","https://openalex.org/W3160027900","https://openalex.org/W4249060904","https://openalex.org/W6645614418"],"related_works":["https://openalex.org/W3120961607","https://openalex.org/W4401568740","https://openalex.org/W3148568549","https://openalex.org/W2098207691","https://openalex.org/W1648516568","https://openalex.org/W361036515","https://openalex.org/W2269474412","https://openalex.org/W4211178602","https://openalex.org/W2433923775","https://openalex.org/W2537599394"],"abstract_inverted_index":{"Physical":[0],"Unclonable":[1],"Functions":[2],"(PUFs)":[3],"are":[4,17,54,80],"considered":[5],"as":[6],"an":[7,31,129,194],"attractive":[8],"low-cost":[9],"security":[10,109,203],"anchor.":[11],"The":[12,76,98,172,185],"unique":[13,90,152,170],"features":[14],"of":[15,92,155,205],"PUFs":[16,29,93,119],"dependent":[18],"on":[19,176],"the":[20,25,41,48,65,69,89,108,117,133,142,151,158,161,177,202,206],"Nanoscale":[21],"variations":[22],"introduced":[23],"during":[24],"manufacturing":[26],"variations.":[27],"Most":[28],"exhibit":[30],"unreliability":[32],"problem":[33],"due":[34],"to":[35,40,47,103,123],"aging":[36],"and":[37,63,136],"inherent":[38],"sensitivity":[39],"environmental":[42],"conditions.":[43],"As":[44],"a":[45,73,95,148],"remedy":[46],"reliability":[49],"issue,":[50],"helper":[51,59,66,78],"data":[52,60,67,79,106,126,144,162],"algorithms":[53],"used":[55,81,102,122],"in":[56,68,72,107,147,198],"practice.":[57],"A":[58],"algorithm":[61],"generates":[62],"stores":[64],"enrollment":[70,134],"phase":[71,135],"secure":[74],"environment.":[75,200],"generated":[77],"then":[82,164],"for":[83],"error":[84],"correction,":[85],"which":[86],"can":[87,100,120,163,192],"transform":[88],"feature":[91],"into":[94],"reproducible":[96],"key.":[97],"key":[99],"be":[101,121,165],"encrypt":[104],"secret":[105,124,143],"scheme.":[110],"In":[111,139],"contrast,":[112],"this":[113,169],"work":[114],"shows":[115],"that":[116,189],"fuzzy":[118,153],"important":[125],"directly":[127],"by":[128,168],"error-tolerant":[130],"protocol":[131],"without":[132],"error-correction":[137],"algorithm.":[138],"our":[140,190],"proposal,":[141],"is":[145,209],"locked":[146],"vault":[149],"leveraging":[150],"pattern":[154],"PUF.":[156,171,184],"Although":[157],"noise":[159],"exists,":[160],"released":[166],"only":[167],"evaluation":[173],"was":[174],"performed":[175],"most":[178],"prominent":[179],"intrinsic":[180],"PUF":[181],"-":[182],"DRAM":[183],"test":[186],"results":[187],"demonstrate":[188],"proposal":[191,208],"reach":[193],"acceptable":[195],"reconstruction":[196],"rate":[197],"various":[199],"Finally,":[201],"analysis":[204],"new":[207],"discussed.":[210]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
