Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Guajardo, Jorge
add a person with the name Guajardo, Jorge
 

Other publications of authors with the same name

Physical Unclonable Functions and Their Applications to Vehicle System Security., , , and . VTC Spring, IEEE, (2009)Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction., , and . Towards Hardware-Intrinsic Security, Springer, (2010)Physical Unclonable Functions (PUFs).. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Privacy preserving evaluation of signal quality with application to ECG analysis., , and . WIFS, page 1-6. IEEE, (2010)A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services., , and . IACR Cryptology ePrint Archive, (2017)MEMS-based Gyroscopes as Physical Unclonable Functions., , , and . IACR Cryptology ePrint Archive, (2016)Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)., , , and . IACR Cryptology ePrint Archive, (2003)MEMS Gyroscopes as Physical Unclonable Functions., , , and . ACM Conference on Computer and Communications Security, page 591-602. ACM, (2016)Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays., , , , and . ISSE, page 313-321. Vieweg+Teubner, (2007)Anonymous Credential Schemes with Encrypted Attributes., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 314-333. Springer, (2010)