This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the...
This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. Th...
This book discusses the simulation of conversations through a novel approach of predicting speech quality based on the interactions of two simulated interlocutors. The author describes the setup of a simulation environment that is capable of simulating human dialogue on the speech level. The impact of delay and bursty packet loss on VoIP conversations is investigated and modeled for the use in the simulation. Based on parameters extracted from simulated conversations, the author proposes extensions to the E-model, a parametric model standardized by the International Telecommunications Union,...
This book discusses the simulation of conversations through a novel approach of predicting speech quality based on the interactions of two simulated i...