Skip to main navigation
Skip to search
Skip to main content
Arizona Board of Regents Home
Search content at Arizona Board of Regents
Home
Profiles
Departments and Centers
Scholarly Works
Grants
Activities
Equipment
Datasets
Press/Media
Prizes
RRAM-based hardware security primitives
Xiaoyu Sun
, Rui Liu
, Huaqiang Wu
, Yachuan Pang
, Bin Gao
, He Qian
, An Chen
Connection One (C1)
Embedded Systems, Consortium for (CES)
Computing and Augmented Intelligence, School of (IAFSE-SCAI)
Electrical, Computer, and Energy Engineering, School of (IAFSE-ECEE)
Electrical Engineering
Computer Science and Engineering
Research output
:
Chapter in Book/Report/Conference proceeding
›
Chapter
1
Link opens in a new tab
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'RRAM-based hardware security primitives'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Internet of Things
100%
Hardware Security
100%
Integrated Circuits
66%
Security Issues
66%
Internet of Things Devices
66%
Network Security
33%
Adversary
33%
Popular
33%
Buying
33%
Device Server
33%
Potential Risk
33%
Recent Advances
33%
Apple
33%
User Credentials
33%
Entertainment
33%
Trustworthiness
33%
Intellectual Property Theft
33%
Electronic Commerce
33%
Personal Networks
33%
Mobile Banking
33%
Home Office
33%
Cloud Security
33%
Reverse Engineering
33%
Access Channel
33%
Personal Devices
33%
Counterfeiting
33%
Global Supply Chain
33%
Electronic Information Exchange
33%
Hardware Trojan
33%
Device Signatures
33%
Network Servers
33%
Overbuilding
33%
Security Breaches
33%
Distributed Supply Chain
33%
Sony
33%
Home Depot
33%
Information Leakage
33%
Network Layer
33%
Connected Devices
33%
Cloud Layer
33%
Identity Information
33%
Secure Information
33%
Computer Science
Internet of Things
100%
Hardware Security
100%
Internet of Things Device
66%
Integrated Circuits
66%
Network Security
33%
Supply Chain
33%
Cloud Security
33%
Security Breach
33%
Authentication
33%
Access Channel
33%
Mobile Banking
33%
e-Commerce
33%
Electronic Information
33%
Reverse Engineering
33%
Server and Network
33%
Security Problem
33%
Connected Device
33%
Information Leak
33%
Hardware Layer
33%