Paul Duplys

According to our database1, Paul Duplys authored at least 16 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A survey of contemporary open-source honeypots, frameworks, and tools.
J. Netw. Comput. Appl., November, 2023

2020
Intrusion Detection for SOME/IP: Challenges and Opportunities.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

2017
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access, 2017

LWE-based lossless computational fuzzy extractor for the Internet of Things.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

2016
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptol. ePrint Arch., 2016

Information reconciliation schemes in physical-layer security: A survey.
Comput. Networks, 2016

Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

On the Energy Cost of Channel Based Key Agreement.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

2015
Securing systems on the Internet of Things via physical properties of devices and communications.
Proceedings of the Annual IEEE Systems Conference, 2015

2014
Reciprocity enhancement and decorrelation schemes for PHY-based key generation.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2011
Fault attack resistant deterministic random bit generator usable for key randomization.
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011

2010
Key randomization using a power analysis resistant deterministic random bit generator.
Proceedings of the 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 2010

2009
Linear and nonlinear MISR operations for safety and security in automotive applications.
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009

Nonlinear compression functions using the MISR approach for security purposes in automotive applications.
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009

2006
Monitoring-based Formal Hardware Verification.
Proceedings of the Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen (MBMV), 2006


  Loading...