Follow
Ghaith Hammouri
Ghaith Hammouri
Claveo Software
Verified email at alum.wpi.edu
Title
Cited by
Cited by
Year
Towards robust low cost authentication for pervasive devices
E Öztürk, G Hammouri, B Sunar
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1452008
Physical unclonable function with tristate buffers
E Ozturk, G Hammouri, B Sunar
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 3194-3197, 2008
1162008
PUF-HB: A tamper-resilient HB based authentication protocol
G Hammouri, B Sunar
Applied Cryptography and Network Security: 6th International Conference …, 2008
982008
CDs have fingerprints too
G Hammouri, A Dana, B Sunar
International Workshop on Cryptographic Hardware and Embedded Systems, 348-362, 2009
892009
A tamper-proof and lightweight authentication scheme
G Hammouri, E Öztürk, B Sunar
Pervasive and mobile computing 4 (6), 807-818, 2008
672008
Systems and methods for authorizing transactions via a digital device
M Hubert, C Walker, C Minden, G Hammouri, CK Koc
US Patent 10,013,692, 2018
512018
Bandwidth efficient PIR from NTRU
Y Doröz, B Sunar, G Hammouri
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
502014
Unclonable lightweight authentication scheme
G Hammouri, E Öztürk, B Birand, B Sunar
Information and Communications Security: 10th International Conference …, 2008
352008
Method and apparatus for fingerprinting and copy protecting optical recording media
B Sunar, G Hammouri, A Dana
US Patent App. 12/831,518, 2011
192011
Non-linear error detection for finite state machines
KD Akdemir, G Hammouri, B Sunar
International Workshop on Information Security Applications, 226-238, 2009
152009
Novel puf-based error detection methods in finite state machines
G Hammouri, K Akdemir, B Sunar
International Conference on Information Security and Cryptology, 235-252, 2008
132008
A fast real-time memory authentication protocol
Y Hu, G Hammouri, B Sunar
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 31-40, 2008
122008
Computing-system identifier using software extraction of manufacturing variability
GM Hammouri, B Sunar, CK Koc, KD Akdemir
US Patent 8,694,687, 2014
82014
Mobile phone aided operations system and method
GM Hammouri, B Sunar, CK Koc
US Patent 8,842,827, 2014
42014
Voice passwords revisited
C Yang, G Hammouri, B Sunar
International Conference on Security and Cryptography 2, 163-171, 2012
42012
Generating unique identifiers for smartphones using software
G Hammouri, B Sunar
Electronics letters 50 (13), 938-939, 2014
12014
License Distribution Protocols from Optical Media Fingerprints
G Hammouri, A Dana, B Sunar
Towards Hardware-Intrinsic Security: Foundations and Practice, 201-222, 2010
2010
Cryptographic Primitives from Physical Variables
G Hammouri
Worcester Polytechnic Institute, 2009
2009
LightSec 2011
D Aranha, H Bahsi, B Bayoglu, F Birinci, A Blaich, I Erguler, B Gurdag, ...
The system can't perform the operation now. Try again later.
Articles 1–19