Publications by authors named "Hoda AlKhzaimi"

Physical unclonable functions (PUFs) have emerged as a favorable hardware security primitive, they exploit the process variations to provide unique signatures or secret keys amidst other critical cryptographic applications. CMOS-based PUFs are the most popular type, they generate unique bit strings using process variations in semiconductor fabrication. However, most existing CMOS PUFs are found to be vulnerable to modeling attacks based on machine learning (ML) algorithms.

View Article and Find Full Text PDF

Sepsis remains a major challenge that necessitates improved approaches to enhance patient outcomes. This study explored the potential of machine learning (ML) techniques to bridge the gap between clinical data and gene expression information to better predict and understand sepsis. We discuss the application of ML algorithms, including neural networks, deep learning, and ensemble methods, to address key evidence gaps and overcome the challenges in sepsis research.

View Article and Find Full Text PDF

The healthcare ecosystem is migrating from legacy systems to the Internet of Things (IoT), resulting in a digital environment. This transformation has increased importance on demanding both secure and usable user authentication methods. Recently, a post-quantum fuzzy commitment scheme (PQFC) has been constructed as a reliable and efficient method of biometric template protection.

View Article and Find Full Text PDF
Article Synopsis
  • Physical Unclonable Functions (PUFs) are cryptographic tools that leverage inherent randomness from manufacturing variations to create secure applications, with the latest advancements highlighting memristor-based PUFs as more robust against attacks.
  • The research focuses on developing a cost-effective memristor PUF that passes 15 NIST randomness tests, demonstrating properties like uniqueness, uniformity, and repeatability, while also being compatible with CMOS technologies.
  • The paper also explores the memristor PUF's application in enhancing encryption processes and in a new authenticated key exchange protocol for secure communications in advanced metering infrastructures used in smart grids.
View Article and Find Full Text PDF