User profiles for Basel Halak
Dr Basel HalakAssociate Professor,University of Southampton Verified email at ecs.soton.ac.uk Cited by 1335 |
Lightweight PUF-based authentication protocol for IoT devices
Conventional cryptographic solutions to the security are expensive in terms of computing
resources (memory and processing capacity) and power consumption. They are not suitable for …
resources (memory and processing capacity) and power consumption. They are not suitable for …
[BOOK][B] Physically unclonable functions
B Halak - 2018 - Springer
Computing devices are increasingly forming an integral part of our daily life; this trend is driven
by the proliferation of the Internet of things (IoT) technology. By 2025, it is anticipated that …
by the proliferation of the Internet of things (IoT) technology. By 2025, it is anticipated that …
Overview of PUF-based hardware security solutions for the Internet of Things
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained
devices such as sensors nodes and actuators, which are linked to the Internet. By 2020 it is …
devices such as sensors nodes and actuators, which are linked to the Internet. By 2020 it is …
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
Public key algorithms are heavily used in many digital applications including key establishment
schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. …
schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. …
Software supply chain: review of attacks, risk assessment strategies and security controls
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open-…
software supply chain as a distribution vector. As the reliance of software projects on open-…
A tutorial on adversarial learning attacks and countermeasures
…, M Gimson, M Qaid, A Kida, B Halak - arXiv preprint arXiv …, 2022 - arxiv.org
Machine learning algorithms are used to construct a mathematical model for a system based
on training data. Such a model is capable of making highly accurate predictions without …
on training data. Such a model is capable of making highly accurate predictions without …
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF
The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and
including many companies located in different countries, makes it challenging to assess the …
including many companies located in different countries, makes it challenging to assess the …
[BOOK][B] Ageing of integrated circuits: causes, effects and mitigation techniques
B Halak - 2019 - Springer
… Basel Halak is the founder and director of the embedded system program at the University
of Southampton and a fellow of the royal academy of engineering. He is currently a member …
of Southampton and a fellow of the royal academy of engineering. He is currently a member …
Plagiarism detection and prevention techniques in engineering education
B Halak, M El-Hajjar - 2016 11th European Workshop on …, 2016 - ieeexplore.ieee.org
Plagiarism seriously damages the education process in a number of ways, where it
prevents students from developing the skills of creative thinking and critical analysis and it …
prevents students from developing the skills of creative thinking and critical analysis and it …
Partial coding algorithm for area and energy efficient crosstalk avoidance codes implementation
B Halak - IET Computers & Digital Techniques, 2014 - Wiley Online Library
Modern interconnect performance is greatly affected by crosstalk noise because of continuous
decrease in wire separation and increase in its aspect ratio with technology scaling. Such …
decrease in wire separation and increase in its aspect ratio with technology scaling. Such …