Ghaith Hammouri

According to our database1, Ghaith Hammouri authored at least 12 papers between 2008 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Bandwidth Efficient PIR from NTRU.
IACR Cryptol. ePrint Arch., 2014

2012
Voice Passwords Revisited.
Proceedings of the SECRYPT 2012, 2012

2010
License Distribution Protocols from Optical Media Fingerprints.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

2009
Non-linear Error Detection for Finite State Machines.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

CDs Have Fingerprints Too.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
A tamper-proof and lightweight authentication scheme.
Pervasive Mob. Comput., 2008

Towards Robust Low Cost Authentication for Pervasive Devices.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Physical unclonable function with tristate buffers.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Novel PUF-Based Error Detection Methods in Finite State Machines.
Proceedings of the Information Security and Cryptology, 2008

Unclonable Lightweight Authentication Scheme.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

A fast real-time memory authentication protocol.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008


  Loading...