Ghaith Hammouri
Ghaith Hammouri
Claveo Software
Vahvistettu sähköpostiosoite verkkotunnuksessa alum.wpi.edu
Nimike
Viittaukset
Viittaukset
Vuosi
Towards robust low cost authentication for pervasive devices
E Öztürk, G Hammouri, B Sunar
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1322008
Physical unclonable function with tristate buffers
E Ozturk, G Hammouri, B Sunar
2008 IEEE International Symposium on Circuits and Systems, 3194-3197, 2008
1062008
PUF-HB: A tamper-resilient HB based authentication protocol
G Hammouri, B Sunar
International conference on applied cryptography and network security, 346-365, 2008
872008
CDs have fingerprints too
G Hammouri, A Dana, B Sunar
International Workshop on Cryptographic Hardware and Embedded Systems, 348-362, 2009
662009
A tamper-proof and lightweight authentication scheme
G Hammouri, E Öztürk, B Sunar
Pervasive and mobile computing 4 (6), 807-818, 2008
552008
Bandwidth efficient PIR from NTRU
Y Doröz, B Sunar, G Hammouri
International Conference on Financial Cryptography and Data Security, 195-207, 2014
432014
Systems and methods for authorizing transactions via a digital device
M Hubert, C Walker, C Minden, G Hammouri, CK Koc
US Patent 10,013,692, 2018
412018
Unclonable lightweight authentication scheme
G Hammouri, E Öztürk, B Birand, B Sunar
International Conference on Information and Communications Security, 33-48, 2008
332008
Method and apparatus for fingerprinting and copy protecting optical recording media
B Sunar, G Hammouri, A Dana
US Patent App. 12/831,518, 2011
122011
Non-linear error detection for finite state machines
KD Akdemir, G Hammouri, B Sunar
International Workshop on Information Security Applications, 226-238, 2009
122009
Novel puf-based error detection methods in finite state machines
G Hammouri, K Akdemir, B Sunar
International Conference on Information Security and Cryptology, 235-252, 2008
122008
A fast real-time memory authentication protocol
Y Hu, G Hammouri, B Sunar
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 31-40, 2008
112008
Computing-system identifier using software extraction of manufacturing variability
GM Hammouri, B Sunar, CK Koc, KD Akdemir
US Patent 8,694,687, 2014
62014
Mobile phone aided operations system and method
GM Hammouri, B Sunar, CK Koc
US Patent 8,842,827, 2014
52014
The two (computational) faces of AI
D Davenport
Philosophy and Theory of Artificial Intelligence, 43-58, 2013
42013
Voice Passwords Revisited.
C Yang, G Hammouri, B Sunar
SECRYPT, 163-171, 2012
42012
Injectable intraocular lens
PP Huo, S Zhou, C Liau
US Patent App. 10/013,692, 2002
42002
Generating unique identifiers for smartphones using software
G Hammouri, B Sunar
Electronics letters 50 (13), 938-939, 2014
12014
License Distribution Protocols from Optical Media Fingerprints
G Hammouri, A Dana, B Sunar
Towards Hardware-Intrinsic Security, 201-222, 2010
2010
Cryptographic Primitives from Physical Variables
G Hammouri
Worcester Polytechnic Institute, 2009
2009
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20